Malware Analysis Report

2025-04-13 23:20

Sample ID 240428-1ls5msac6s
Target CompatibilityCheck.exe
SHA256 6f9b61794c9169a8860fb74e2cc0253b0bc283327b6485f799265f702a67c921
Tags
i am furry njrat evasion persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6f9b61794c9169a8860fb74e2cc0253b0bc283327b6485f799265f702a67c921

Threat Level: Known bad

The file CompatibilityCheck.exe was found to be: Known bad.

Malicious Activity Summary

i am furry njrat evasion persistence

Njrat family

Modifies Windows Firewall

Executes dropped EXE

Drops startup file

Checks computer location settings

Adds Run key to start application

Drops file in System32 directory

Drops autorun.inf file

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Gathers network information

Suspicious use of WriteProcessMemory

Modifies data under HKEY_USERS

Suspicious use of AdjustPrivilegeToken

Suspicious use of SendNotifyMessage

Checks processor information in registry

Uses Task Scheduler COM API

Kills process with taskkill

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of FindShellTrayWindow

Suspicious behavior: LoadsDriver

Modifies registry class

Checks SCSI registry key(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-28 21:44

Signatures

Njrat family

njrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-28 21:44

Reported

2024-04-28 21:47

Platform

win10v2004-20240419-en

Max time kernel

143s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\CompatibilityCheck.exe"

Signatures

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\CompatibilityCheck.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e14109296e01cf24bb9b7f72f64c4cb3.exe C:\ProgramData\COM Surrogate.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e14109296e01cf24bb9b7f72f64c4cb3.exe C:\ProgramData\COM Surrogate.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e14109296e01cf24bb9b7f72f64c4cb3 = "\"C:\\ProgramData\\COM Surrogate.exe\" .." C:\ProgramData\COM Surrogate.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\e14109296e01cf24bb9b7f72f64c4cb3 = "\"C:\\ProgramData\\COM Surrogate.exe\" .." C:\ProgramData\COM Surrogate.exe N/A

Drops autorun.inf file

Description Indicator Process Target
File opened for modification F:\autorun.inf C:\ProgramData\COM Surrogate.exe N/A
File created C:\autorun.inf C:\ProgramData\COM Surrogate.exe N/A
File opened for modification C:\autorun.inf C:\ProgramData\COM Surrogate.exe N/A
File created D:\autorun.inf C:\ProgramData\COM Surrogate.exe N/A
File created F:\autorun.inf C:\ProgramData\COM Surrogate.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\SRU\SRU.chk C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\system32\SRU\SRU.log C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\system32\SRU\SRUDB.dat C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\system32\SRU\SRUDB.jfm C:\Windows\System32\svchost.exe N/A
File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF C:\Windows\System32\svchost.exe N/A
File created C:\Windows\system32\NDF\{894C82FC-3C60-4CBB-81E2-3259F6D6CB6F}-temp-04282024-2146.etl C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\system32\NDF\{894C82FC-3C60-4CBB-81E2-3259F6D6CB6F}-temp-04282024-2146.etl C:\Windows\System32\svchost.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenPbk\rasphone.pbk C:\Windows\System32\svchost.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A C:\Windows\system32\taskmgr.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\system32\taskmgr.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\System32\svchost.exe N/A
Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\System32\svchost.exe N/A

Gathers network information

Description Indicator Process Target
N/A N/A C:\Windows\system32\ipconfig.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\RAS AutoDial C:\Windows\System32\svchost.exe N/A
Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\RAS AutoDial\Default C:\Windows\System32\svchost.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" C:\Windows\System32\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" C:\Windows\System32\svchost.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU C:\Windows\system32\taskmgr.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots C:\Windows\system32\taskmgr.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff C:\Windows\system32\taskmgr.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\Local Settings C:\Windows\system32\taskmgr.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell C:\Windows\system32\taskmgr.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\ProgramData\COM Surrogate.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\ProgramData\COM Surrogate.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\sdiagnhost.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A
Token: 33 N/A C:\ProgramData\COM Surrogate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\COM Surrogate.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\System32\msdt.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1004 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\CompatibilityCheck.exe C:\ProgramData\COM Surrogate.exe
PID 1004 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\CompatibilityCheck.exe C:\ProgramData\COM Surrogate.exe
PID 1004 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\CompatibilityCheck.exe C:\ProgramData\COM Surrogate.exe
PID 4996 wrote to memory of 4072 N/A C:\ProgramData\COM Surrogate.exe C:\Windows\SysWOW64\netsh.exe
PID 4996 wrote to memory of 4072 N/A C:\ProgramData\COM Surrogate.exe C:\Windows\SysWOW64\netsh.exe
PID 4996 wrote to memory of 4072 N/A C:\ProgramData\COM Surrogate.exe C:\Windows\SysWOW64\netsh.exe
PID 4996 wrote to memory of 4080 N/A C:\ProgramData\COM Surrogate.exe C:\Windows\SysWOW64\taskkill.exe
PID 4996 wrote to memory of 4080 N/A C:\ProgramData\COM Surrogate.exe C:\Windows\SysWOW64\taskkill.exe
PID 4996 wrote to memory of 4080 N/A C:\ProgramData\COM Surrogate.exe C:\Windows\SysWOW64\taskkill.exe
PID 5940 wrote to memory of 6132 N/A C:\Windows\System32\sdiagnhost.exe C:\Windows\system32\netsh.exe
PID 5940 wrote to memory of 6132 N/A C:\Windows\System32\sdiagnhost.exe C:\Windows\system32\netsh.exe
PID 5940 wrote to memory of 1544 N/A C:\Windows\System32\sdiagnhost.exe C:\Windows\system32\netsh.exe
PID 5940 wrote to memory of 1544 N/A C:\Windows\System32\sdiagnhost.exe C:\Windows\system32\netsh.exe
PID 5940 wrote to memory of 5184 N/A C:\Windows\System32\sdiagnhost.exe C:\Windows\system32\ipconfig.exe
PID 5940 wrote to memory of 5184 N/A C:\Windows\System32\sdiagnhost.exe C:\Windows\system32\ipconfig.exe
PID 5940 wrote to memory of 5220 N/A C:\Windows\System32\sdiagnhost.exe C:\Windows\system32\ROUTE.EXE
PID 5940 wrote to memory of 5220 N/A C:\Windows\System32\sdiagnhost.exe C:\Windows\system32\ROUTE.EXE
PID 5940 wrote to memory of 5252 N/A C:\Windows\System32\sdiagnhost.exe C:\Windows\system32\makecab.exe
PID 5940 wrote to memory of 5252 N/A C:\Windows\System32\sdiagnhost.exe C:\Windows\system32\makecab.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\CompatibilityCheck.exe

"C:\Users\Admin\AppData\Local\Temp\CompatibilityCheck.exe"

C:\ProgramData\COM Surrogate.exe

"C:\ProgramData\COM Surrogate.exe"

C:\Windows\SysWOW64\netsh.exe

netsh firewall add allowedprogram "C:\ProgramData\COM Surrogate.exe" "COM Surrogate.exe" ENABLE

C:\Windows\SysWOW64\taskkill.exe

taskkill /F /IM SecHealthUI.exe

C:\Windows\system32\taskmgr.exe

"C:\Windows\system32\taskmgr.exe" /4

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\ProgramData\COM Surrogate.exe

"C:\ProgramData\COM Surrogate.exe"

C:\ProgramData\COM Surrogate.exe

"C:\ProgramData\COM Surrogate.exe"

C:\Windows\System32\msdt.exe

"C:\Windows\System32\msdt.exe" -skip TRUE -id NetworkDiagnosticsNetworkAdapter -ep NetworkDiagnosticsPNI

C:\Windows\System32\sdiagnhost.exe

C:\Windows\System32\sdiagnhost.exe -Embedding

C:\Windows\system32\netsh.exe

"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter AdapterGuid={492807CF-4C1C-4B46-B759-3B07CD93BC18}

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s DPS

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalService -p -s WdiServiceHost

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost

C:\Windows\system32\netsh.exe

"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter AdapterGuid={492807CF-4C1C-4B46-B759-3B07CD93BC18}

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman

C:\Windows\system32\ipconfig.exe

"C:\Windows\system32\ipconfig.exe" /all

C:\Windows\system32\ROUTE.EXE

"C:\Windows\system32\ROUTE.EXE" print

C:\Windows\system32\makecab.exe

"C:\Windows\system32\makecab.exe" /f NetworkConfiguration.ddf

C:\ProgramData\COM Surrogate.exe

"C:\ProgramData\COM Surrogate.exe"

C:\ProgramData\COM Surrogate.exe

"C:\ProgramData\COM Surrogate.exe"

C:\ProgramData\COM Surrogate.exe

"C:\ProgramData\COM Surrogate.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 green-morrison.gl.at.ply.gg udp
US 8.8.8.8:53 green-morrison.gl.at.ply.gg udp
US 8.8.8.8:53 green-morrison.gl.at.ply.gg udp
US 8.8.8.8:53 green-morrison.gl.at.ply.gg udp
US 8.8.8.8:53 green-morrison.gl.at.ply.gg udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 green-morrison.gl.at.ply.gg udp
US 8.8.8.8:53 green-morrison.gl.at.ply.gg udp
US 8.8.8.8:53 green-morrison.gl.at.ply.gg udp
US 8.8.8.8:53 green-morrison.gl.at.ply.gg udp

Files

memory/1004-0-0x0000000074CC0000-0x0000000075271000-memory.dmp

memory/1004-1-0x0000000074CC0000-0x0000000075271000-memory.dmp

memory/1004-2-0x0000000000860000-0x0000000000870000-memory.dmp

C:\ProgramData\COM Surrogate.exe

MD5 0c84829a79c06e88510607526990391e
SHA1 63970a42f5b779c1f0f8d95d493317917b0bd46d
SHA256 6f9b61794c9169a8860fb74e2cc0253b0bc283327b6485f799265f702a67c921
SHA512 85638191fee2b456e601487aff23bc5dccbfd24e74970e5f1d8fbdad633a3d31208887f682debf1fd2abcec6e36c50e74b6da30c660dfa0bc0471e7ef8c98f40

memory/4996-13-0x0000000074CC0000-0x0000000075271000-memory.dmp

memory/1004-12-0x0000000074CC0000-0x0000000075271000-memory.dmp

memory/4996-23-0x0000000074CC0000-0x0000000075271000-memory.dmp

memory/4228-25-0x000002BE8F030000-0x000002BE8F031000-memory.dmp

memory/4228-24-0x000002BE8F030000-0x000002BE8F031000-memory.dmp

memory/4228-26-0x000002BE8F030000-0x000002BE8F031000-memory.dmp

memory/4228-36-0x000002BE8F030000-0x000002BE8F031000-memory.dmp

memory/4228-35-0x000002BE8F030000-0x000002BE8F031000-memory.dmp

memory/4228-34-0x000002BE8F030000-0x000002BE8F031000-memory.dmp

memory/4228-33-0x000002BE8F030000-0x000002BE8F031000-memory.dmp

memory/4228-32-0x000002BE8F030000-0x000002BE8F031000-memory.dmp

memory/4228-31-0x000002BE8F030000-0x000002BE8F031000-memory.dmp

memory/4228-30-0x000002BE8F030000-0x000002BE8F031000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\COM Surrogate.exe.log

MD5 da4fafeffe21b7cb3a8c170ca7911976
SHA1 50ef77e2451ab60f93f4db88325b897d215be5ad
SHA256 7341a4a13e81cbb5b7f39ec47bb45f84836b08b8d8e3ea231d2c7dad982094f7
SHA512 0bc24b69460f31a0ebc0628b99908d818ee85feb7e4b663271d9375b30cced0cd55a0bbf8edff1281a4c886ddf4476ffc989c283069cdcb1235ffcb265580fc6

C:\Windows\Temp\SDIAG_0879c3b7-68bd-440e-8c8f-9e8a18cbaf51\en-US\DiagPackage.dll.mui

MD5 44c4385447d4fa46b407fc47c8a467d0
SHA1 41e4e0e83b74943f5c41648f263b832419c05256
SHA256 8be175e8fbdae0dade54830fece6c6980d1345dbeb4a06c07f7efdb1152743f4
SHA512 191cd534e85323a4cd9649a1fc372312ed4a600f6252dffc4435793650f9dd40d0c0e615ba5eb9aa437a58af334146aac7c0ba08e0a1bf24ec4837a40f966005

C:\Windows\Temp\SDIAG_0879c3b7-68bd-440e-8c8f-9e8a18cbaf51\DiagPackage.dll

MD5 580dc3658fa3fe42c41c99c52a9ce6b0
SHA1 3c4be12c6e3679a6c2267f88363bbd0e6e00cac5
SHA256 5b7aa413e4a64679c550c77e6599a1c940ee947cbdf77d310e142a07a237aad2
SHA512 68c52cd7b762b8f5d2f546092ed9c4316924fa04bd3ab748ab99541a8b4e7d9aec70acf5c9594d1457ad3a2f207d0c189ec58421d4352ddbc7eae453324d13f2

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_eid4qyrl.qvv.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/5940-410-0x00000249FF0E0000-0x00000249FF102000-memory.dmp

C:\Windows\TEMP\SDIAG_0879c3b7-68bd-440e-8c8f-9e8a18cbaf51\NetworkDiagnosticsTroubleshoot.ps1

MD5 d0cfc204ca3968b891f7ce0dccfb2eda
SHA1 56dad1716554d8dc573d0ea391f808e7857b2206
SHA256 e3940266b4368c04333db89804246cb89bf2073626f22b8de72bea27c522282a
SHA512 4d2225b599ad8af8ba8516f12cfddca5ec0ce69c5c80b133a6a323e9aaf5e0312efbcfa54d2e4462a5095f9a7c42b9d5b39f3204e0be72c3b1992cf33b22087c

C:\Windows\TEMP\SDIAG_0879c3b7-68bd-440e-8c8f-9e8a18cbaf51\UtilityFunctions.ps1

MD5 c912faa190464ce7dec867464c35a8dc
SHA1 d1c6482dad37720db6bdc594c4757914d1b1dd70
SHA256 3891846307aa9e83bca66b13198455af72af45bf721a2fbd41840d47e2a91201
SHA512 5c34352d36459fd8fcda5b459a2e48601a033af31d802a90ed82c443a5a346b9480880d30c64db7ad0e4a8c35b98c98f69eceedad72f2a70d9c6cca74dce826a

C:\Windows\TEMP\SDIAG_0879c3b7-68bd-440e-8c8f-9e8a18cbaf51\UtilitySetConstants.ps1

MD5 0c75ae5e75c3e181d13768909c8240ba
SHA1 288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256 de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA512 8fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b

C:\Windows\TEMP\SDIAG_0879c3b7-68bd-440e-8c8f-9e8a18cbaf51\en-US\LocalizationData.psd1

MD5 380768979618b7097b0476179ec494ed
SHA1 af2a03a17c546e4eeb896b230e4f2a52720545ab
SHA256 0637af30fc3b3544b1f516f6196a8f821ffbfa5d36d65a8798aeeadbf2e8a7c2
SHA512 b9ef59e9bfdbd49052a4e754ead8cd54b77e79cc428e7aee2b80055ff5f0b038584af519bd2d66258cf3c01f8cc71384f6959ee32111eac4399c47e1c2352302

C:\Windows\TEMP\SDIAG_0879c3b7-68bd-440e-8c8f-9e8a18cbaf51\StartDPSService.ps1

MD5 a660422059d953c6d681b53a6977100e
SHA1 0c95dd05514d062354c0eecc9ae8d437123305bb
SHA256 d19677234127c38a52aec23686775a8eb3f4e3a406f4a11804d97602d6c31813
SHA512 26f8cf9ac95ff649ecc2ed349bc6c7c3a04b188594d5c3289af8f2768ab59672bc95ffefcc83ed3ffa44edd0afeb16a4c2490e633a89fce7965843674d94b523

memory/3776-420-0x00000200B3100000-0x00000200B3110000-memory.dmp

memory/3776-424-0x00000200B35A0000-0x00000200B35A1000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\NetTraces\NdfSession-04282024-2146.etl

MD5 40b9af2b06be8c5d09014724d1731840
SHA1 3b92f8523cf8785899a7572a2a3e8de049161d12
SHA256 ae977dca9352710f690206b576f7db5e0a50606f81da162050df4bcd1ca44931
SHA512 d2dfc665f211e10f5076cde91176a06cdb6cc24651dde449f7cb2651389d8a2e57d90e699c65e6dd2488def7a8853f1a77abfc4f331e73e0370c91f88dcecd56

C:\Users\Admin\AppData\Local\Temp\tmpD0D8.tmp\NetworkConfiguration.ddf

MD5 00848049d4218c485d9e9d7a54aa3b5f
SHA1 d1d5f388221417985c365e8acaec127b971c40d0
SHA256 ffeafbb8e7163fd7ec9abc029076796c73cd7b4eddaeeda9ba394c547419769e
SHA512 3a4874a5289682e2b32108740feea586cb9ccdad9ca08bf30f67c9742370c081ad943ea714f08dbf722f9f98f3b0bb307619a8ba47f96b24301c68b0fd1086d9

C:\Users\Admin\AppData\Local\Temp\tmpD0D8.tmp\ipconfig.all.txt

MD5 e8854e671204751608ed66bd5e0d5da5
SHA1 8ca9d5851d60c8fc7fae9e2f75b419de74c5993e
SHA256 e89ff7b50aaa91700c7d5496309e8ca2efe8e0ce82235f7fc56ad6de02da17a6
SHA512 79c5e415a341c350b7ad8c4fb701667f004ab17d307574ae512aea48507e3c3bc091fe97979c97f6144411a3a75b8704309bb2f4cf06e9d93d9ff12695fb58cb

C:\Users\Admin\AppData\Local\Temp\tmpD0D8.tmp\route.print.txt

MD5 d28ad02413c40387ea3651c129ec3498
SHA1 cb6c7224a125dc06a1b6ee6dcdb05db83935d8ec
SHA256 72dac253d8ff513154c735511c97f213411ffbf3bf8db5f59d22e493f551ff78
SHA512 dcf1d076f640beb2a391ef79fb6ec15d473d0c859d79d1120c6a66acce08938993810e9dec5231efcd6f0e5ff8be7f24aa362ff99e60d00352e17ca531e0b4e2

C:\Users\Admin\AppData\Local\Temp\tmpD0D8.tmp\NetworkConfiguration.cab

MD5 d856aef2bf338d81efd990d1e5bb592d
SHA1 185745cf605d0ee7ff62af8e183bef093f375c7c
SHA256 6e5a68e5e1cc500d16153b5389865f69ed7f7ff82599aa6d5d37b6b0930054ac
SHA512 607d9015f60c3dc1b1807046e7e2456a1843cc18287336c749421721e18e4f03e1bc7ca8ef06d65918b7ab8d6aeb04611c2f0c25cedab07518f88dbcecb7f8fc

C:\Users\Admin\AppData\Local\Temp\tmpD0D8.tmp\setup.inf

MD5 78fb2abcc7034ae36debb48d724dfb02
SHA1 848eeaf76435b7349b794ef66d3e2d5040c6286d
SHA256 6a525835a04aeb5088d88b1637e15b680445328d84d38b6efe050b79bf30b7df
SHA512 5ff625f23c53c70337408279bc7245fd1f12c362725e009d396e1654689d2509c31375fddda6bedc30cda68694f6ea605f58a44b4bd3dbbfa5d343d995b1d164

C:\Users\Admin\AppData\Local\Temp\tmpD0D8.tmp\setup.rpt

MD5 f4aec6c7039635ab7aab94a991c13c57
SHA1 2d18c57400f14ddf014c1c2c3d1d6ce8c4e700d5
SHA256 8f0d389937307c5ac58d93374494c8cbea70ee32a89b980a525d2310a0f2a860
SHA512 18eafb888964a255d33b922703cb47cc29d773ec5a3842edd55036201c33d59e2bc8486edbf9cbe07aee398c4b557e300bbcaf610e92f08201c8dac5adfeec7b

C:\Windows\TEMP\SDIAG_0879c3b7-68bd-440e-8c8f-9e8a18cbaf51\NetworkDiagnosticsResolve.ps1

MD5 d213491a2d74b38a9535d616b9161217
SHA1 bde94742d1e769638e2de84dfb099f797adcc217
SHA256 4662c3c94e0340a243c2a39ca8a88fd9f65c74fb197644a11d4ffcae6b191211
SHA512 5fd8b91b27935711495934e5d7ca14f9dd72bc40a38072595879ef334a47f99e0608087ddc62668c6f783938d9f22a3688c5cdef3a9ad6c3575f3cfa5a3b0104

C:\Windows\TEMP\SDIAG_0879c3b7-68bd-440e-8c8f-9e8a18cbaf51\NetworkDiagnosticsVerify.ps1

MD5 9b222d8ec4b20860f10ebf303035b984
SHA1 b30eea35c2516afcab2c49ef6531af94efaf7e1a
SHA256 a32e13da40ac4b9e1dac7dd28bc1d25e2f2136b61ff93be943018b20796f15bc
SHA512 8331337ccb6e3137b01aeec03e6921fd3b9e56c44fa1b17545ae5c7bfcdd39fcd8a90192884b3a82f56659009e24b63ce7f500e8766fd01e8d4e60a52de0fe67

C:\Users\Admin\AppData\Local\ElevatedDiagnostics\1612347604\2024042821.000\NetworkDiagnostics.debugreport.xml

MD5 07dc521514357d3bb72c4f0e506913e0
SHA1 f1fb3b0f4266386cfcb9876cffa61acbb26ec2b1
SHA256 4a9b16b6e962544ab435c55a37c81b910976fb15d372997acb8594419e22c8ef
SHA512 e21df883683add8b6ad811923fb6c53023da98e733f71d9ec0771c7a0816ba8076861e5093ed7014d2c721e4f84abaced27ab7f5067eada1711ec494b77ca0c2

C:\Users\Admin\AppData\Local\ElevatedDiagnostics\1612347604\2024042821.000\results.xsl

MD5 310e1da2344ba6ca96666fb639840ea9
SHA1 e8694edf9ee68782aa1de05470b884cc1a0e1ded
SHA256 67401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c
SHA512 62ab361ffea1f0b6ff1cc76c74b8e20c2499d72f3eb0c010d47dba7e6d723f9948dba3397ea26241a1a995cffce2a68cd0aaa1bb8d917dd8f4c8f3729fa6d244