Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 07:01
Behavioral task
behavioral1
Sample
21d6b63327f1f57348899d5992d43102.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
21d6b63327f1f57348899d5992d43102.exe
Resource
win10v2004-20240419-en
General
-
Target
21d6b63327f1f57348899d5992d43102.exe
-
Size
124KB
-
MD5
21d6b63327f1f57348899d5992d43102
-
SHA1
c1f72ac6dedd7817c094c41df3d9dd505675d93d
-
SHA256
a5d024a0be4a491e5004b9c4c1343fc172e210cc1bf78641d512c6fd9ec41f62
-
SHA512
0af75df0a6dfe44b33b03f4dc716c48db3a479f438fe0a9332b82cc832ffdb2d56254b073bfb67feed8c0f5516ede72a93f1de70e62c8ae9e9e9fd09f600d1cf
-
SSDEEP
1536:IFaM5mTEVEQnqrZM5V3J6fgNWbMb+KR0Nc8QsJq3:iaMqEVEUWZulJGgNAe0Nc8QsC
Malware Config
Extracted
metasploit
windows/reverse_tcp
86.104.74.31:9981
Extracted
metasploit
windows/reverse_winhttp
https://86.104.74.31:2526/ikfdrhy-qkcCVANVZGyCLw-WZQJ__3gJI6bV47gaYkMVSsAScxNyy
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule C:\Windows\System32\WindowsUpdate.exe family_xmrig C:\Windows\System32\WindowsUpdate.exe xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
MDzTJO.exeMDzTJO.exeMDzTJO.exeWindowsUpdate.exePython-deamon.exepid process 4144 MDzTJO.exe 1624 MDzTJO.exe 2072 MDzTJO.exe 3772 WindowsUpdate.exe 2904 Python-deamon.exe -
Drops file in System32 directory 7 IoCs
Processes:
svchost.exeWindowsUpdate.exedescription ioc process File created C:\Windows\System32\config.json svchost.exe File created \??\c:\windows\system32\WindowsUpdate.exe svchost.exe File opened for modification C:\Windows\System32\loger2.log WindowsUpdate.exe File opened for modification \??\c:\windows\system32\config.json WindowsUpdate.exe File created \??\c:\windows\system32\Python-deamon.exe svchost.exe File created \??\c:\windows\system32\patch-updated.txt svchost.exe File created C:\Windows\System32\WinRing0x64.sys svchost.exe -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Windows\System32\Python-deamon.exe pyinstaller -
Modifies data under HKEY_USERS 41 IoCs
Processes:
MDzTJO.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections MDzTJO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MDzTJO.exe -
Modifies registry class 20 IoCs
Processes:
svchost.exeBackgroundTransferHost.exeBackgroundTransferHost.exeBackgroundTransferHost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App svchost.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133594525614212882" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133594525604837594" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133594525620931446" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU svchost.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133594525629837584" svchost.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy svchost.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133594525963587738" svchost.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
21d6b63327f1f57348899d5992d43102.exesvchost.exepid process 1564 21d6b63327f1f57348899d5992d43102.exe 1564 21d6b63327f1f57348899d5992d43102.exe 1564 21d6b63327f1f57348899d5992d43102.exe 1564 21d6b63327f1f57348899d5992d43102.exe 1564 21d6b63327f1f57348899d5992d43102.exe 1564 21d6b63327f1f57348899d5992d43102.exe 1564 21d6b63327f1f57348899d5992d43102.exe 1564 21d6b63327f1f57348899d5992d43102.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe 792 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
21d6b63327f1f57348899d5992d43102.exesvchost.exedescription pid process Token: SeAssignPrimaryTokenPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeAuditPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeBackupPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeChangeNotifyPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeCreateGlobalPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeCreatePagefilePrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeCreatePermanentPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: 35 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeCreateTokenPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: 36 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeEnableDelegationPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeImpersonatePrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeIncBasePriorityPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeIncreaseQuotaPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: 33 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeLoadDriverPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeLockMemoryPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeMachineAccountPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeManageVolumePrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeProfSingleProcessPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: 32 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeRemoteShutdownPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeRestorePrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeSecurityPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeShutdownPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeSyncAgentPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeSystemEnvironmentPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeSystemProfilePrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeSystemtimePrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeTakeOwnershipPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeTcbPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: 34 1564 21d6b63327f1f57348899d5992d43102.exe Token: 31 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeUndockPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: 0 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 1564 21d6b63327f1f57348899d5992d43102.exe Token: SeDebugPrivilege 792 svchost.exe Token: SeDebugPrivilege 792 svchost.exe Token: SeDebugPrivilege 792 svchost.exe Token: SeDebugPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe Token: SeTcbPrivilege 792 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WindowsUpdate.exepid process 3772 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
21d6b63327f1f57348899d5992d43102.execmd.exeMDzTJO.exesvchost.exedescription pid process target process PID 1564 wrote to memory of 452 1564 21d6b63327f1f57348899d5992d43102.exe cmd.exe PID 1564 wrote to memory of 452 1564 21d6b63327f1f57348899d5992d43102.exe cmd.exe PID 1564 wrote to memory of 452 1564 21d6b63327f1f57348899d5992d43102.exe cmd.exe PID 452 wrote to memory of 4144 452 cmd.exe MDzTJO.exe PID 452 wrote to memory of 4144 452 cmd.exe MDzTJO.exe PID 452 wrote to memory of 4144 452 cmd.exe MDzTJO.exe PID 1624 wrote to memory of 2072 1624 MDzTJO.exe MDzTJO.exe PID 1624 wrote to memory of 2072 1624 MDzTJO.exe MDzTJO.exe PID 1624 wrote to memory of 2072 1624 MDzTJO.exe MDzTJO.exe PID 1564 wrote to memory of 792 1564 21d6b63327f1f57348899d5992d43102.exe svchost.exe PID 1564 wrote to memory of 792 1564 21d6b63327f1f57348899d5992d43102.exe svchost.exe PID 1564 wrote to memory of 792 1564 21d6b63327f1f57348899d5992d43102.exe svchost.exe PID 1564 wrote to memory of 792 1564 21d6b63327f1f57348899d5992d43102.exe svchost.exe PID 792 wrote to memory of 512 792 svchost.exe backgroundTaskHost.exe PID 792 wrote to memory of 512 792 svchost.exe backgroundTaskHost.exe PID 792 wrote to memory of 512 792 svchost.exe backgroundTaskHost.exe PID 792 wrote to memory of 4848 792 svchost.exe BackgroundTransferHost.exe PID 792 wrote to memory of 4848 792 svchost.exe BackgroundTransferHost.exe PID 792 wrote to memory of 4848 792 svchost.exe BackgroundTransferHost.exe PID 792 wrote to memory of 4616 792 svchost.exe backgroundTaskHost.exe PID 792 wrote to memory of 4616 792 svchost.exe backgroundTaskHost.exe PID 792 wrote to memory of 4616 792 svchost.exe backgroundTaskHost.exe PID 792 wrote to memory of 64 792 svchost.exe BackgroundTransferHost.exe PID 792 wrote to memory of 64 792 svchost.exe BackgroundTransferHost.exe PID 792 wrote to memory of 64 792 svchost.exe BackgroundTransferHost.exe PID 792 wrote to memory of 3656 792 svchost.exe BackgroundTransferHost.exe PID 792 wrote to memory of 3656 792 svchost.exe BackgroundTransferHost.exe PID 792 wrote to memory of 3656 792 svchost.exe BackgroundTransferHost.exe PID 792 wrote to memory of 3772 792 svchost.exe WindowsUpdate.exe PID 792 wrote to memory of 3772 792 svchost.exe WindowsUpdate.exe PID 792 wrote to memory of 2904 792 svchost.exe Python-deamon.exe PID 792 wrote to memory of 2904 792 svchost.exe Python-deamon.exe PID 792 wrote to memory of 2904 792 svchost.exe Python-deamon.exe PID 792 wrote to memory of 744 792 svchost.exe backgroundTaskHost.exe PID 792 wrote to memory of 744 792 svchost.exe backgroundTaskHost.exe PID 792 wrote to memory of 744 792 svchost.exe backgroundTaskHost.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:512
-
\??\c:\windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵
- Modifies registry class
PID:4848 -
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:4616
-
\??\c:\windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵
- Modifies registry class
PID:64 -
\??\c:\windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵
- Modifies registry class
PID:3656 -
\??\c:\windows\system32\WindowsUpdate.exec:/windows/system32/\WindowsUpdate.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:3772 -
\??\c:\windows\system32\Python-deamon.exec:/windows/system32/\Python-deamon.exe2⤵
- Executes dropped EXE
PID:2904 -
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\21d6b63327f1f57348899d5992d43102.exe"C:\Users\Admin\AppData\Local\Temp\21d6b63327f1f57348899d5992d43102.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MDzTJO.exe" JldBikd2⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\MDzTJO.exeC:\Users\Admin\AppData\Local\Temp\MDzTJO.exe JldBikd3⤵
- Executes dropped EXE
PID:4144
-
C:\Windows\system32\cmd.execmd.exe /c echo hkhhoj > \\.\pipe\hkhhoj1⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\MDzTJO.exe"C:\Users\Admin\AppData\Local\Temp\MDzTJO.exe" pMUmtapl1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\MDzTJO.exeC:\Users\Admin\AppData\Local\Temp\MDzTJO.exe2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2072
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\80763b86-ed3d-40c0-8596-02a30f53324e.down_dataFilesize
439KB
MD5e7d4d8c834f81b46938ee56eb1ec1974
SHA136cd3b81ef0bdd43ffcc3f1d684ca8554b5d3ba9
SHA256b0e22f1db86c4afceb6c86f7a9fb8ffbeedb1e790f76cef9765592483e6360d1
SHA512186846ed80d00ba6b4e20b4391055b0e24392e43ded863b1305ba7a9bd72e8d7ce538a1a1699b4a6d711e070a2226a1c2d97a881a317b87afc9653365dd4cb69
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\e3cd264a-e4b1-4408-9d97-e54a5bc1be06.down_dataFilesize
457KB
MD53daa691a0971e7a4b6c2f2807fb22a9c
SHA160f00370e50a9e9d648b5d2dc8d9fa8e7a554049
SHA25610f3aeee4aa8e7cc98d1d0d2ab3763f53e38bb0856851c3b2cc86845d871d298
SHA5121dc0723fa0aacff5aace89556ff4b1dc7eea044c61954814afaf5dfc8dea7de603a99c877003b54f9e89c519ea54f85e3d5fa94513d49a29ccbc809c24e63b1e
-
C:\Users\Admin\AppData\Local\Temp\MDzTJO.exeFilesize
8KB
MD527f21ce7e4e96e0e3f7642acbc7c000f
SHA1a6a5774cff6cfc3c74d2c5a93fec751657c48e5a
SHA256a70de8c5648bde459a0711f4770fc0b57d1ac10d784ebc1884b236394a07380c
SHA512f4303b011787fc1aef56534da99efc9aefc492f369dcbf62e2db8f5dc3c6a0515d44f018587ca6dcc53121b2f2946744244009273b8f79af542ade38d21003a8
-
C:\Windows\System32\Python-deamon.exeFilesize
4.9MB
MD52213c24bf5f894162377e83435bf6394
SHA134d35d4fefa2464c7a7adcf844a2055161283fcb
SHA256920ddce9db19abbde837de204acf2c28abdc93525d50c74e686f2b64560dc6a2
SHA5124fbccf72968372841668a4860ac5201138458c98eaf6dd034e435ae0741dba143cc5d5241cf19c1aee18ac425eb25ad3f9dd04452bc302b27f825313785fd554
-
C:\Windows\System32\WindowsUpdate.exeFilesize
5.4MB
MD51ce931c7db9f11fe942e34857e16100e
SHA118aa4aa3d4f4653ca3c8fb706b004f911a5dd9de
SHA2567fac868eff64e2fae4e1d2cc9ef2d30b6e865e91f48782d5400f7f1376aeb543
SHA51244d99eb110efd3e636a8c74015277f13b24306e41965a67a1b970e7a07cb63343a7e6d1dc48308a6a115330e568ea5c7e50e2ec8897e639de2d322278fa67a9e
-
\??\c:\windows\system32\config.jsonFilesize
2KB
MD597190f32e9ebd6cfc56e63a7b558b4e5
SHA19085d5e432921cfee05603fc4cee635860494c78
SHA25625e696edfadd0de5f13af4d3a7bd85a5cceac365d6d3ba96d1db4cdf3123ed2d
SHA512d521d2efe74278b74bf04ef397ca33ed32afbd4b0d61442cfd4d57b4f940981472634eba8c32dffc996dbc79d47c2ab48ae53d0fca0f786cc2bd1329a5566617
-
memory/792-145-0x000001BD33E00000-0x000001BD34000000-memory.dmpFilesize
2.0MB
-
memory/792-119-0x0000000000920000-0x0000000000952000-memory.dmpFilesize
200KB
-
memory/792-272-0x000001BD33E00000-0x000001BD34000000-memory.dmpFilesize
2.0MB
-
memory/792-271-0x000001BD33E00000-0x000001BD34000000-memory.dmpFilesize
2.0MB
-
memory/792-131-0x000001BD33E00000-0x000001BD34000000-memory.dmpFilesize
2.0MB
-
memory/1564-110-0x0000000002520000-0x0000000002620000-memory.dmpFilesize
1024KB
-
memory/1564-36-0x00000000009C0000-0x00000000009E5000-memory.dmpFilesize
148KB
-
memory/1564-67-0x0000000000910000-0x0000000000941000-memory.dmpFilesize
196KB
-
memory/1564-20-0x0000000002520000-0x0000000002620000-memory.dmpFilesize
1024KB
-
memory/1564-1-0x00000000006C0000-0x00000000006EC000-memory.dmpFilesize
176KB
-
memory/1564-2-0x0000000000910000-0x0000000000941000-memory.dmpFilesize
196KB
-
memory/1564-15-0x0000000000950000-0x00000000009B3000-memory.dmpFilesize
396KB
-
memory/1564-111-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1564-42-0x0000000000910000-0x0000000000941000-memory.dmpFilesize
196KB
-
memory/1564-41-0x0000000002520000-0x0000000002620000-memory.dmpFilesize
1024KB
-
memory/1564-0-0x0000000000670000-0x0000000000671000-memory.dmpFilesize
4KB
-
memory/1564-8-0x0000000000910000-0x0000000000941000-memory.dmpFilesize
196KB
-
memory/1564-7-0x0000000000910000-0x0000000000941000-memory.dmpFilesize
196KB
-
memory/1564-62-0x0000000000910000-0x0000000000941000-memory.dmpFilesize
196KB
-
memory/1564-21-0x0000000000910000-0x0000000000941000-memory.dmpFilesize
196KB
-
memory/1564-6-0x00000000006C0000-0x00000000006EC000-memory.dmpFilesize
176KB
-
memory/2072-87-0x0000000001800000-0x0000000001C00000-memory.dmpFilesize
4.0MB
-
memory/2072-75-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB