Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 07:00
Behavioral task
behavioral1
Sample
21d6b63327f1f57348899d5992d43102.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21d6b63327f1f57348899d5992d43102.exe
Resource
win10v2004-20240419-en
General
-
Target
21d6b63327f1f57348899d5992d43102.exe
-
Size
124KB
-
MD5
21d6b63327f1f57348899d5992d43102
-
SHA1
c1f72ac6dedd7817c094c41df3d9dd505675d93d
-
SHA256
a5d024a0be4a491e5004b9c4c1343fc172e210cc1bf78641d512c6fd9ec41f62
-
SHA512
0af75df0a6dfe44b33b03f4dc716c48db3a479f438fe0a9332b82cc832ffdb2d56254b073bfb67feed8c0f5516ede72a93f1de70e62c8ae9e9e9fd09f600d1cf
-
SSDEEP
1536:IFaM5mTEVEQnqrZM5V3J6fgNWbMb+KR0Nc8QsJq3:iaMqEVEUWZulJGgNAe0Nc8QsC
Malware Config
Extracted
metasploit
windows/reverse_tcp
86.104.74.31:9981
Extracted
metasploit
windows/reverse_winhttp
https://86.104.74.31:2526/QFdn-an7LHXwH_EelidwNALmab8nbAeOtEi1Yl3P72-JNCwyowwFlk68eXfNDS9-kdqb4r2ePQlozfgaqz7zjmwbWEZMELNzJghq2QD2e7G_n7TOWCrhIRiQxMb-xV3inm-tt9SwNaVUoFkq4CgzV-6j1O22d4xaPK9AAHu57c34Y6kcLN8ei3gF2cPwQM-A52_6XfA8FqJ0ov95KWITQ
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule C:\Windows\System32\WindowsUpdate.exe family_xmrig C:\Windows\System32\WindowsUpdate.exe xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
TpkoZj.exeTpkoZj.exeTpkoZj.exeWindowsUpdate.exePython-deamon.exepid process 4288 TpkoZj.exe 4780 TpkoZj.exe 4088 TpkoZj.exe 4136 WindowsUpdate.exe 4240 Python-deamon.exe -
Drops file in System32 directory 13 IoCs
Processes:
TpkoZj.exeWindowsUpdate.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 TpkoZj.exe File opened for modification C:\Windows\System32\loger2.log WindowsUpdate.exe File created \??\c:\windows\system32\patch-updated.txt svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft TpkoZj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content TpkoZj.exe File created \??\c:\windows\system32\WindowsUpdate.exe svchost.exe File opened for modification \??\c:\windows\system32\config.json WindowsUpdate.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache TpkoZj.exe File created C:\Windows\System32\WinRing0x64.sys svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData TpkoZj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 TpkoZj.exe File created C:\Windows\System32\config.json svchost.exe File created \??\c:\windows\system32\Python-deamon.exe svchost.exe -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Windows\System32\Python-deamon.exe pyinstaller -
Modifies data under HKEY_USERS 41 IoCs
Processes:
TpkoZj.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates TpkoZj.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs TpkoZj.exe -
Modifies registry class 15 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133594524872302278" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI\V1\LU svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI\V1\LU\PCT = "133579884076612522" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI\V1\LU\ICT = "133579884078800045" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App svchost.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU svchost.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy svchost.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133594524878083569" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy svchost.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI\V1 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133594525201833962" svchost.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
21d6b63327f1f57348899d5992d43102.exesvchost.exepid process 1888 21d6b63327f1f57348899d5992d43102.exe 1888 21d6b63327f1f57348899d5992d43102.exe 1888 21d6b63327f1f57348899d5992d43102.exe 1888 21d6b63327f1f57348899d5992d43102.exe 1888 21d6b63327f1f57348899d5992d43102.exe 1888 21d6b63327f1f57348899d5992d43102.exe 1888 21d6b63327f1f57348899d5992d43102.exe 1888 21d6b63327f1f57348899d5992d43102.exe 776 svchost.exe 776 svchost.exe 776 svchost.exe 776 svchost.exe 776 svchost.exe 776 svchost.exe 776 svchost.exe 776 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
21d6b63327f1f57348899d5992d43102.exesvchost.exeWindowsUpdate.exedescription pid process Token: SeAssignPrimaryTokenPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeAuditPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeBackupPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeChangeNotifyPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeCreateGlobalPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeCreatePagefilePrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeCreatePermanentPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: 35 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeCreateTokenPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: 36 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeEnableDelegationPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeImpersonatePrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeIncBasePriorityPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeIncreaseQuotaPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: 33 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeLoadDriverPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeLockMemoryPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeMachineAccountPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeManageVolumePrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeProfSingleProcessPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: 32 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeRemoteShutdownPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeRestorePrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeSecurityPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeShutdownPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeSyncAgentPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeSystemEnvironmentPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeSystemProfilePrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeSystemtimePrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeTakeOwnershipPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeTcbPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: 34 1888 21d6b63327f1f57348899d5992d43102.exe Token: 31 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeUndockPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: 0 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 1888 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 776 svchost.exe Token: SeDebugPrivilege 776 svchost.exe Token: SeDebugPrivilege 776 svchost.exe Token: SeDebugPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeLockMemoryPrivilege 4136 WindowsUpdate.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe Token: SeTcbPrivilege 776 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WindowsUpdate.exepid process 4136 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
21d6b63327f1f57348899d5992d43102.execmd.exeTpkoZj.exesvchost.exedescription pid process target process PID 1888 wrote to memory of 4468 1888 21d6b63327f1f57348899d5992d43102.exe cmd.exe PID 1888 wrote to memory of 4468 1888 21d6b63327f1f57348899d5992d43102.exe cmd.exe PID 1888 wrote to memory of 4468 1888 21d6b63327f1f57348899d5992d43102.exe cmd.exe PID 4468 wrote to memory of 4288 4468 cmd.exe TpkoZj.exe PID 4468 wrote to memory of 4288 4468 cmd.exe TpkoZj.exe PID 4468 wrote to memory of 4288 4468 cmd.exe TpkoZj.exe PID 4780 wrote to memory of 4088 4780 TpkoZj.exe TpkoZj.exe PID 4780 wrote to memory of 4088 4780 TpkoZj.exe TpkoZj.exe PID 4780 wrote to memory of 4088 4780 TpkoZj.exe TpkoZj.exe PID 1888 wrote to memory of 776 1888 21d6b63327f1f57348899d5992d43102.exe svchost.exe PID 1888 wrote to memory of 776 1888 21d6b63327f1f57348899d5992d43102.exe svchost.exe PID 1888 wrote to memory of 776 1888 21d6b63327f1f57348899d5992d43102.exe svchost.exe PID 1888 wrote to memory of 776 1888 21d6b63327f1f57348899d5992d43102.exe svchost.exe PID 776 wrote to memory of 4124 776 svchost.exe backgroundTaskHost.exe PID 776 wrote to memory of 4124 776 svchost.exe backgroundTaskHost.exe PID 776 wrote to memory of 4124 776 svchost.exe backgroundTaskHost.exe PID 776 wrote to memory of 4136 776 svchost.exe WindowsUpdate.exe PID 776 wrote to memory of 4136 776 svchost.exe WindowsUpdate.exe PID 776 wrote to memory of 4240 776 svchost.exe Python-deamon.exe PID 776 wrote to memory of 4240 776 svchost.exe Python-deamon.exe PID 776 wrote to memory of 4240 776 svchost.exe Python-deamon.exe PID 776 wrote to memory of 788 776 svchost.exe backgroundTaskHost.exe PID 776 wrote to memory of 788 776 svchost.exe backgroundTaskHost.exe PID 776 wrote to memory of 788 776 svchost.exe backgroundTaskHost.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:4124
-
\??\c:\windows\system32\WindowsUpdate.exec:/windows/system32/\WindowsUpdate.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4136 -
\??\c:\windows\system32\Python-deamon.exec:/windows/system32/\Python-deamon.exe2⤵
- Executes dropped EXE
PID:4240 -
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\21d6b63327f1f57348899d5992d43102.exe"C:\Users\Admin\AppData\Local\Temp\21d6b63327f1f57348899d5992d43102.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\TpkoZj.exe" WIOpTON2⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\TpkoZj.exeC:\Users\Admin\AppData\Local\Temp\TpkoZj.exe WIOpTON3⤵
- Executes dropped EXE
PID:4288
-
C:\Windows\system32\cmd.execmd.exe /c echo tffnev > \\.\pipe\tffnev1⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\TpkoZj.exe"C:\Users\Admin\AppData\Local\Temp\TpkoZj.exe" LsXT1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\TpkoZj.exeC:\Users\Admin\AppData\Local\Temp\TpkoZj.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4088
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\TpkoZj.exeFilesize
10KB
MD55581032c78f96c48cb5576cef71b3672
SHA17d6b19ccb84917d1e52ca853a64ee1a2ba941a21
SHA256f7cd8c058f3499b5d38a80e3134c8edca152a1ca70952c91190322850cb6b15d
SHA51233521c19d5424084b0bc3ef2f244506e024ec4c2553f2a3834a6377d8046a3156ab39b8c2eacc8268a123fcf75b714e05c4f5e107fdfd1d6108fc28595760f26
-
C:\Windows\System32\Python-deamon.exeFilesize
4.9MB
MD52213c24bf5f894162377e83435bf6394
SHA134d35d4fefa2464c7a7adcf844a2055161283fcb
SHA256920ddce9db19abbde837de204acf2c28abdc93525d50c74e686f2b64560dc6a2
SHA5124fbccf72968372841668a4860ac5201138458c98eaf6dd034e435ae0741dba143cc5d5241cf19c1aee18ac425eb25ad3f9dd04452bc302b27f825313785fd554
-
C:\Windows\System32\WindowsUpdate.exeFilesize
5.4MB
MD51ce931c7db9f11fe942e34857e16100e
SHA118aa4aa3d4f4653ca3c8fb706b004f911a5dd9de
SHA2567fac868eff64e2fae4e1d2cc9ef2d30b6e865e91f48782d5400f7f1376aeb543
SHA51244d99eb110efd3e636a8c74015277f13b24306e41965a67a1b970e7a07cb63343a7e6d1dc48308a6a115330e568ea5c7e50e2ec8897e639de2d322278fa67a9e
-
\??\c:\windows\system32\config.jsonFilesize
2KB
MD597190f32e9ebd6cfc56e63a7b558b4e5
SHA19085d5e432921cfee05603fc4cee635860494c78
SHA25625e696edfadd0de5f13af4d3a7bd85a5cceac365d6d3ba96d1db4cdf3123ed2d
SHA512d521d2efe74278b74bf04ef397ca33ed32afbd4b0d61442cfd4d57b4f940981472634eba8c32dffc996dbc79d47c2ab48ae53d0fca0f786cc2bd1329a5566617
-
memory/776-315-0x000001B03C600000-0x000001B03C800000-memory.dmpFilesize
2.0MB
-
memory/776-253-0x000001B03C600000-0x000001B03C800000-memory.dmpFilesize
2.0MB
-
memory/776-252-0x000001B03C600000-0x000001B03C800000-memory.dmpFilesize
2.0MB
-
memory/776-225-0x000001B03C600000-0x000001B03C800000-memory.dmpFilesize
2.0MB
-
memory/776-152-0x000001B03C600000-0x000001B03C800000-memory.dmpFilesize
2.0MB
-
memory/776-138-0x000001B03C600000-0x000001B03C800000-memory.dmpFilesize
2.0MB
-
memory/776-126-0x0000000000FD0000-0x0000000001002000-memory.dmpFilesize
200KB
-
memory/1888-20-0x00000000008F0000-0x0000000000921000-memory.dmpFilesize
196KB
-
memory/1888-35-0x00000000026E0000-0x0000000002705000-memory.dmpFilesize
148KB
-
memory/1888-61-0x00000000008F0000-0x0000000000921000-memory.dmpFilesize
196KB
-
memory/1888-1-0x00000000008C0000-0x00000000008EC000-memory.dmpFilesize
176KB
-
memory/1888-2-0x00000000008F0000-0x0000000000921000-memory.dmpFilesize
196KB
-
memory/1888-117-0x00000000008C0000-0x00000000008EC000-memory.dmpFilesize
176KB
-
memory/1888-118-0x0000000000960000-0x0000000000961000-memory.dmpFilesize
4KB
-
memory/1888-41-0x00000000008F0000-0x0000000000921000-memory.dmpFilesize
196KB
-
memory/1888-40-0x0000000002570000-0x0000000002670000-memory.dmpFilesize
1024KB
-
memory/1888-66-0x00000000008F0000-0x0000000000921000-memory.dmpFilesize
196KB
-
memory/1888-0-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/1888-19-0x0000000002570000-0x0000000002670000-memory.dmpFilesize
1024KB
-
memory/1888-14-0x0000000002670000-0x00000000026D3000-memory.dmpFilesize
396KB
-
memory/1888-7-0x00000000008F0000-0x0000000000921000-memory.dmpFilesize
196KB
-
memory/1888-6-0x00000000008F0000-0x0000000000921000-memory.dmpFilesize
196KB
-
memory/4088-83-0x0000000001CC0000-0x00000000020C0000-memory.dmpFilesize
4.0MB
-
memory/4088-74-0x00000000005F0000-0x00000000005F1000-memory.dmpFilesize
4KB