Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 13:42
Static task
static1
Behavioral task
behavioral1
Sample
MW2 FOV Changer.exe
Resource
win7-20240221-en
General
-
Target
MW2 FOV Changer.exe
-
Size
15.2MB
-
MD5
57d5a31aa74a02a1c155aaa618c290c1
-
SHA1
9dd86085bc7f7497d8b437de5da8db54e8703ace
-
SHA256
af917a63e27ea18999a8f1feb4e7fa60955f21dd3c8fac6a4d9c5bb34f4d2ca1
-
SHA512
c46bfd6e3877812bad8456e6d13c36db4f69d8e6798d47a41aa24bb3f16229deef2e852b9956ab745ae1acdbcf1a4b610e7b652ab16902f0efe8f4988c4559f3
-
SSDEEP
24576:tvoagpQjczZKdUt5TKX+aW1dMG0m6jYg1CZbBJT0n:5TaQgZ2GbMGf4CZDIn
Malware Config
Extracted
nanocore
1.2.2.0
kbdjfaskjhgasdfkjg.ddns.com:1604
bb5fce1b-dde0-4e14-a44f-41a608ac20db
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2016-07-29T01:59:05.148193536Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1604
-
default_group
Slave
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
bb5fce1b-dde0-4e14-a44f-41a608ac20db
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
kbdjfaskjhgasdfkjg.ddns.com
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Drops startup file 9 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WMIhook.exe.lnk WMIhook.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WMIhook.exe.lnk WMIhook.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WMIhook.exe.lnk WMIhook.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WMIhook.exe.lnk WMIhook.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WMIhook.exe.lnk WMIhook.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WMIhook.exe.lnk WMIhook.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WMIhook.exe.lnk SystemHosts.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WMIhook.exe.lnk WMIhook.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WMIhook.exe.lnk WMIhook.exe -
Executes dropped EXE 29 IoCs
pid Process 2648 SystemHosts.exe 2664 svhost.exe 2084 tmp.exe 2696 svhost.exe 316 WMIhook.exe 2056 WMIhook.exe 2344 tmp.exe 2808 svhost.exe 996 tmp.exe 1356 svhost.exe 2784 WMIhook.exe 2752 tmp.exe 2748 svhost.exe 2820 WMIhook.exe 1036 tmp.exe 2112 svhost.exe 2292 WMIhook.exe 1876 tmp.exe 960 svhost.exe 856 WMIhook.exe 1632 tmp.exe 1552 svhost.exe 1992 WMIhook.exe 2748 tmp.exe 2044 svhost.exe 568 WMIhook.exe 1204 tmp.exe 2600 svhost.exe 1092 WMIhook.exe -
Loads dropped DLL 24 IoCs
pid Process 2208 MW2 FOV Changer.exe 2208 MW2 FOV Changer.exe 2208 MW2 FOV Changer.exe 2648 SystemHosts.exe 2648 SystemHosts.exe 2648 SystemHosts.exe 2648 SystemHosts.exe 2648 SystemHosts.exe 348 cmd.exe 316 WMIhook.exe 2056 WMIhook.exe 348 cmd.exe 2784 WMIhook.exe 348 cmd.exe 2820 WMIhook.exe 348 cmd.exe 2292 WMIhook.exe 348 cmd.exe 856 WMIhook.exe 348 cmd.exe 1992 WMIhook.exe 348 cmd.exe 568 WMIhook.exe 348 cmd.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svhost.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 2208 set thread context of 2664 2208 MW2 FOV Changer.exe 29 PID 2648 set thread context of 2696 2648 SystemHosts.exe 36 PID 316 set thread context of 2808 316 WMIhook.exe 49 PID 2056 set thread context of 1356 2056 WMIhook.exe 54 PID 2784 set thread context of 2748 2784 WMIhook.exe 63 PID 2820 set thread context of 2112 2820 WMIhook.exe 74 PID 2292 set thread context of 960 2292 WMIhook.exe 83 PID 856 set thread context of 1552 856 WMIhook.exe 92 PID 1992 set thread context of 2044 1992 WMIhook.exe 101 PID 568 set thread context of 2600 568 WMIhook.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe -
Delays execution with timeout.exe 8 IoCs
pid Process 2008 timeout.exe 2848 timeout.exe 916 timeout.exe 1744 timeout.exe 2560 timeout.exe 1264 timeout.exe 1304 timeout.exe 992 timeout.exe -
Enumerates processes with tasklist 1 TTPs 8 IoCs
pid Process 2732 tasklist.exe 2656 tasklist.exe 1764 tasklist.exe 1540 tasklist.exe 324 tasklist.exe 2176 tasklist.exe 780 tasklist.exe 1736 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2208 MW2 FOV Changer.exe 2208 MW2 FOV Changer.exe 2664 svhost.exe 2664 svhost.exe 2664 svhost.exe 2648 SystemHosts.exe 2648 SystemHosts.exe 2648 SystemHosts.exe 316 WMIhook.exe 316 WMIhook.exe 316 WMIhook.exe 2056 WMIhook.exe 2056 WMIhook.exe 2056 WMIhook.exe 2784 WMIhook.exe 2784 WMIhook.exe 2784 WMIhook.exe 2820 WMIhook.exe 2820 WMIhook.exe 2820 WMIhook.exe 2292 WMIhook.exe 2292 WMIhook.exe 2292 WMIhook.exe 856 WMIhook.exe 856 WMIhook.exe 856 WMIhook.exe 1992 WMIhook.exe 1992 WMIhook.exe 1992 WMIhook.exe 568 WMIhook.exe 568 WMIhook.exe 568 WMIhook.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2664 svhost.exe 2084 tmp.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2208 MW2 FOV Changer.exe Token: 33 2208 MW2 FOV Changer.exe Token: SeIncBasePriorityPrivilege 2208 MW2 FOV Changer.exe Token: SeDebugPrivilege 2648 SystemHosts.exe Token: 33 2648 SystemHosts.exe Token: SeIncBasePriorityPrivilege 2648 SystemHosts.exe Token: SeDebugPrivilege 2664 svhost.exe Token: SeDebugPrivilege 2084 tmp.exe Token: 33 2084 tmp.exe Token: SeIncBasePriorityPrivilege 2084 tmp.exe Token: SeDebugPrivilege 316 WMIhook.exe Token: 33 316 WMIhook.exe Token: SeIncBasePriorityPrivilege 316 WMIhook.exe Token: SeDebugPrivilege 780 tasklist.exe Token: SeDebugPrivilege 2056 WMIhook.exe Token: 33 2056 WMIhook.exe Token: SeIncBasePriorityPrivilege 2056 WMIhook.exe Token: SeDebugPrivilege 1736 tasklist.exe Token: SeDebugPrivilege 2784 WMIhook.exe Token: 33 2784 WMIhook.exe Token: SeIncBasePriorityPrivilege 2784 WMIhook.exe Token: SeDebugPrivilege 2732 tasklist.exe Token: SeDebugPrivilege 2820 WMIhook.exe Token: 33 2820 WMIhook.exe Token: SeIncBasePriorityPrivilege 2820 WMIhook.exe Token: SeDebugPrivilege 2656 tasklist.exe Token: SeDebugPrivilege 2292 WMIhook.exe Token: 33 2292 WMIhook.exe Token: SeIncBasePriorityPrivilege 2292 WMIhook.exe Token: SeDebugPrivilege 1764 tasklist.exe Token: SeDebugPrivilege 856 WMIhook.exe Token: 33 856 WMIhook.exe Token: SeIncBasePriorityPrivilege 856 WMIhook.exe Token: SeDebugPrivilege 1540 tasklist.exe Token: SeDebugPrivilege 1992 WMIhook.exe Token: 33 1992 WMIhook.exe Token: SeIncBasePriorityPrivilege 1992 WMIhook.exe Token: SeDebugPrivilege 324 tasklist.exe Token: SeDebugPrivilege 568 WMIhook.exe Token: 33 568 WMIhook.exe Token: SeIncBasePriorityPrivilege 568 WMIhook.exe Token: SeDebugPrivilege 2176 tasklist.exe Token: SeDebugPrivilege 1092 WMIhook.exe Token: 33 1092 WMIhook.exe Token: SeIncBasePriorityPrivilege 1092 WMIhook.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2084 tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2648 2208 MW2 FOV Changer.exe 28 PID 2208 wrote to memory of 2648 2208 MW2 FOV Changer.exe 28 PID 2208 wrote to memory of 2648 2208 MW2 FOV Changer.exe 28 PID 2208 wrote to memory of 2648 2208 MW2 FOV Changer.exe 28 PID 2208 wrote to memory of 2664 2208 MW2 FOV Changer.exe 29 PID 2208 wrote to memory of 2664 2208 MW2 FOV Changer.exe 29 PID 2208 wrote to memory of 2664 2208 MW2 FOV Changer.exe 29 PID 2208 wrote to memory of 2664 2208 MW2 FOV Changer.exe 29 PID 2208 wrote to memory of 2664 2208 MW2 FOV Changer.exe 29 PID 2208 wrote to memory of 2664 2208 MW2 FOV Changer.exe 29 PID 2208 wrote to memory of 2664 2208 MW2 FOV Changer.exe 29 PID 2208 wrote to memory of 2664 2208 MW2 FOV Changer.exe 29 PID 2208 wrote to memory of 2664 2208 MW2 FOV Changer.exe 29 PID 2664 wrote to memory of 2760 2664 svhost.exe 30 PID 2664 wrote to memory of 2760 2664 svhost.exe 30 PID 2664 wrote to memory of 2760 2664 svhost.exe 30 PID 2664 wrote to memory of 2760 2664 svhost.exe 30 PID 2648 wrote to memory of 2476 2648 SystemHosts.exe 32 PID 2648 wrote to memory of 2476 2648 SystemHosts.exe 32 PID 2648 wrote to memory of 2476 2648 SystemHosts.exe 32 PID 2648 wrote to memory of 2476 2648 SystemHosts.exe 32 PID 2476 wrote to memory of 2240 2476 cmd.exe 34 PID 2476 wrote to memory of 2240 2476 cmd.exe 34 PID 2476 wrote to memory of 2240 2476 cmd.exe 34 PID 2476 wrote to memory of 2240 2476 cmd.exe 34 PID 2648 wrote to memory of 2084 2648 SystemHosts.exe 35 PID 2648 wrote to memory of 2084 2648 SystemHosts.exe 35 PID 2648 wrote to memory of 2084 2648 SystemHosts.exe 35 PID 2648 wrote to memory of 2084 2648 SystemHosts.exe 35 PID 2648 wrote to memory of 2696 2648 SystemHosts.exe 36 PID 2648 wrote to memory of 2696 2648 SystemHosts.exe 36 PID 2648 wrote to memory of 2696 2648 SystemHosts.exe 36 PID 2648 wrote to memory of 2696 2648 SystemHosts.exe 36 PID 2648 wrote to memory of 2696 2648 SystemHosts.exe 36 PID 2648 wrote to memory of 2696 2648 SystemHosts.exe 36 PID 2648 wrote to memory of 2696 2648 SystemHosts.exe 36 PID 2648 wrote to memory of 2696 2648 SystemHosts.exe 36 PID 2648 wrote to memory of 2696 2648 SystemHosts.exe 36 PID 2648 wrote to memory of 348 2648 SystemHosts.exe 37 PID 2648 wrote to memory of 348 2648 SystemHosts.exe 37 PID 2648 wrote to memory of 348 2648 SystemHosts.exe 37 PID 2648 wrote to memory of 348 2648 SystemHosts.exe 37 PID 348 wrote to memory of 1304 348 cmd.exe 39 PID 348 wrote to memory of 1304 348 cmd.exe 39 PID 348 wrote to memory of 1304 348 cmd.exe 39 PID 348 wrote to memory of 1304 348 cmd.exe 39 PID 2648 wrote to memory of 316 2648 SystemHosts.exe 40 PID 2648 wrote to memory of 316 2648 SystemHosts.exe 40 PID 2648 wrote to memory of 316 2648 SystemHosts.exe 40 PID 2648 wrote to memory of 316 2648 SystemHosts.exe 40 PID 348 wrote to memory of 780 348 cmd.exe 41 PID 348 wrote to memory of 780 348 cmd.exe 41 PID 348 wrote to memory of 780 348 cmd.exe 41 PID 348 wrote to memory of 780 348 cmd.exe 41 PID 348 wrote to memory of 536 348 cmd.exe 42 PID 348 wrote to memory of 536 348 cmd.exe 42 PID 348 wrote to memory of 536 348 cmd.exe 42 PID 348 wrote to memory of 536 348 cmd.exe 42 PID 348 wrote to memory of 2056 348 cmd.exe 44 PID 348 wrote to memory of 2056 348 cmd.exe 44 PID 348 wrote to memory of 2056 348 cmd.exe 44 PID 348 wrote to memory of 2056 348 cmd.exe 44 PID 316 wrote to memory of 1536 316 WMIhook.exe 45 PID 316 wrote to memory of 1536 316 WMIhook.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\MW2 FOV Changer.exe"C:\Users\Admin\AppData\Local\Temp\MW2 FOV Changer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\SystemHosts.exe"C:\Users\Admin\AppData\Local\Temp\SystemHosts.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f4⤵PID:2240
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
C:\Users\Admin\AppData\Roaming\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost.exe"3⤵
- Executes dropped EXE
PID:2696
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.bat3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:1304
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"4⤵PID:536
-
-
C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"5⤵PID:1132
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f6⤵PID:2136
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"5⤵
- Executes dropped EXE
PID:996
-
-
C:\Users\Admin\AppData\Roaming\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost.exe"5⤵
- Executes dropped EXE
PID:1356
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:992
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"4⤵PID:1800
-
-
C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"5⤵PID:1724
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f6⤵PID:2604
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"5⤵
- Executes dropped EXE
PID:2752
-
-
C:\Users\Admin\AppData\Roaming\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost.exe"5⤵
- Executes dropped EXE
PID:2748
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:2008
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"4⤵PID:2960
-
-
C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"5⤵PID:1732
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f6⤵PID:2988
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"5⤵
- Executes dropped EXE
PID:1036
-
-
C:\Users\Admin\AppData\Roaming\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost.exe"5⤵
- Executes dropped EXE
PID:2112
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:2848
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"4⤵PID:3000
-
-
C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"5⤵PID:2256
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f6⤵PID:1432
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"5⤵
- Executes dropped EXE
PID:1876
-
-
C:\Users\Admin\AppData\Roaming\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost.exe"5⤵
- Executes dropped EXE
PID:960
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:916
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"4⤵PID:1520
-
-
C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"5⤵PID:2688
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f6⤵PID:2136
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"5⤵
- Executes dropped EXE
PID:1632
-
-
C:\Users\Admin\AppData\Roaming\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost.exe"5⤵
- Executes dropped EXE
PID:1552
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:1744
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"4⤵PID:2060
-
-
C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"5⤵PID:896
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f6⤵PID:2364
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"5⤵
- Executes dropped EXE
PID:2748
-
-
C:\Users\Admin\AppData\Roaming\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost.exe"5⤵
- Executes dropped EXE
PID:2044
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:2560
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"4⤵PID:1296
-
-
C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:568 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"5⤵PID:1644
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f6⤵PID:2280
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"5⤵
- Executes dropped EXE
PID:1204
-
-
C:\Users\Admin\AppData\Roaming\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost.exe"5⤵
- Executes dropped EXE
PID:2600
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:1264
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"4⤵PID:2036
-
-
C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
-
C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exeC:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"4⤵PID:1536
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WMIHost\WMIhook.exe.lnk " /f5⤵PID:2316
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"4⤵
- Executes dropped EXE
PID:2344
-
-
C:\Users\Admin\AppData\Roaming\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost.exe"4⤵
- Executes dropped EXE
PID:2808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "NAS Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmp31AB.tmp"3⤵
- Creates scheduled task(s)
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD524de2170a8dce23ab327cf07c00cd17e
SHA1c759a98d8447e9674d0707da64cd97204720c0ae
SHA256fa98fbb5ddd9fcbcdc76196d8dc524602815d90d244eb43f7f983a829b7d3b3d
SHA51283ea8711513efbd1a4045b27fcd916cab7c9b6ab3e519500db114287b8a42103f44142e1c350f1f7a0bb76d291bfc838834d423338a23a30ff2f15066ff87d2b
-
Filesize
888B
MD596a4212f83ab5075cbfd833f68d44c5b
SHA10048b5acf59d1178f47f419bd459b86d43b6bb55
SHA2569fe2acda4de2f9c12fea7147b36ca98770afe86b5a902c9f90341e24ac805ac0
SHA512a66272947871062634c4977991cbaa75324ed5ffd9695fae8e0d3d077ece31738f21fba481bea39facdad6e6cb39d41c60552f4e27f87f98f84cd4be3978176e
-
Filesize
190B
MD57940fc58219887a93fd5ec25cb249429
SHA186a8f8971dcfb9d6411bf0376a68ff11f1cf5272
SHA256a4bb7d456f665ce87b608df3ad11c684d231553a511ef0050b197c1dc632b1db
SHA5120adcaf63ec2920082b9ff81ab992aad6c80f9498ada61b88b6fbcef26b667ca6ebb9414354bc7faeaecb0d3c0d5a21313a8e94ca9b440327be68289128d573cb
-
Filesize
100B
MD52aa15a8028ab63147ea2c88ced182f8c
SHA1ed98166113b2952ff5d61fb2211f6d20d1c39e1d
SHA25628cb990a5b7789117a735e842c8a6345ff20e4c2662ec4ae6d664d759bf6dfe1
SHA512f3a13023ab0f06e0abb398d0dec2638ff12d180ad816d23fda257fba091cb347ca174c4c4f0bc6f193bb838c29bae64ad662389c313e07f1fec33a30b5435e64
-
Filesize
6.7MB
MD5ffbb57869e7c843b9cbf902b18a7a94e
SHA134feee7ae338d055b7176a49baa8e23165f2352f
SHA256d3ceef6f206fd2c0b1768f6767da1accfb2c2870512569169fe4706e56b75736
SHA5120fa8b38a7e82964a054c8f56911e6276d50921c3659120b8275e5cfd55fc69644beb6a45f29423a14c26f8b7c39141dcbf25a6aac88de2b5f3ee93a2e8c705eb
-
Filesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9
-
Filesize
349KB
MD54a00f1474bf08339715d1fbc3c7d72b0
SHA192459a6ac28efe4b6ef89e73de1de29ae3d59ce0
SHA256f6b061ab8081596317876f9c7b776cb6466e0c2a19398c31d1a83741d2f94b6c
SHA5124f46d7d00065d1a16ad3db88a6633f0665f2a4fda6041d657b2ea5dfc634d58947e44c3e0957fca30f3e4c473100e28cd77d60e8eea73a1f9a16c3a110b68266