Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 14:13
Behavioral task
behavioral1
Sample
22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe
Resource
win7-20231129-en
General
-
Target
22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe
-
Size
1.9MB
-
MD5
17eb4c4e58353a5db52602d0ae321fbd
-
SHA1
791e65e864b8831b86149c079b09d04cac894e59
-
SHA256
22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1
-
SHA512
a93540c9b59a5000ef53834ff920d8fafa3e1d25da92ead4d523dc684d3824a6e3ccefda736194c0ec1a2e27229ea4096afd65be3ff462fd2e4f22c6058d8d14
-
SSDEEP
24576:kGcK2o1bNcsQSVR7z/7VlQR/Ys6Yy0RbZEd3oJ30mJrqTgOEOkm6GNBO0mQP:7l777HagqbZoaEoki5m6G/FmQ
Malware Config
Signatures
-
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral2/memory/4948-1-0x0000000000860000-0x0000000000A4A000-memory.dmp family_zgrat_v1 behavioral2/files/0x000700000002323e-33.dat family_zgrat_v1 -
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\msedge.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\msedge.exe\", \"C:\\Users\\Default\\Cookies\\sihost.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\msedge.exe\", \"C:\\Users\\Default\\Cookies\\sihost.exe\", \"C:\\Program Files (x86)\\Common Files\\System\\winlogon.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\msedge.exe\", \"C:\\Users\\Default\\Cookies\\sihost.exe\", \"C:\\Program Files (x86)\\Common Files\\System\\winlogon.exe\", \"C:\\Windows\\ShellComponents\\StartMenuExperienceHost.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\msedge.exe\", \"C:\\Users\\Default\\Cookies\\sihost.exe\", \"C:\\Program Files (x86)\\Common Files\\System\\winlogon.exe\", \"C:\\Windows\\ShellComponents\\StartMenuExperienceHost.exe\", \"C:\\Recovery\\WindowsRE\\msedge.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\msedge.exe\", \"C:\\Users\\Default\\Cookies\\sihost.exe\", \"C:\\Program Files (x86)\\Common Files\\System\\winlogon.exe\", \"C:\\Windows\\ShellComponents\\StartMenuExperienceHost.exe\", \"C:\\Recovery\\WindowsRE\\msedge.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3628 powershell.exe 4212 powershell.exe 4964 powershell.exe 2460 powershell.exe 3308 powershell.exe 4820 powershell.exe 2488 powershell.exe 2644 powershell.exe 1248 powershell.exe 1988 powershell.exe 1928 powershell.exe 3972 powershell.exe 1920 powershell.exe 748 powershell.exe 5068 powershell.exe 2288 powershell.exe 2164 powershell.exe 2604 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe -
Executes dropped EXE 1 IoCs
pid Process 4144 msedge.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msedge = "\"C:\\Recovery\\WindowsRE\\msedge.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msedge = "\"C:\\Recovery\\WindowsRE\\msedge.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Users\\Default\\Cookies\\sihost.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files (x86)\\Common Files\\System\\winlogon.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files (x86)\\Common Files\\System\\winlogon.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Windows\\ShellComponents\\StartMenuExperienceHost.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Windows\\ShellComponents\\StartMenuExperienceHost.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Users\\Default\\Cookies\\sihost.exe\"" 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 44 ipinfo.io 45 ipinfo.io -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC815DFC59BD1C40B38645E35E3AB7544F.TMP csc.exe File created \??\c:\Windows\System32\_iyiwy.exe csc.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\System\winlogon.exe 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe File created C:\Program Files (x86)\Common Files\System\cc11b995f2a76d 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe File created \??\c:\Program Files (x86)\Microsoft\Edge\Application\CSC28667D592A054CAB95A6A8605178985C.TMP csc.exe File created \??\c:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe csc.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\ShellComponents\55b276f4edf653 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe File created C:\Windows\WaaS\services\sppsvc.exe 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe File created C:\Windows\ShellComponents\StartMenuExperienceHost.exe 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5676 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2468 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe Token: SeDebugPrivilege 4820 powershell.exe Token: SeDebugPrivilege 1248 powershell.exe Token: SeDebugPrivilege 1988 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 4212 powershell.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeDebugPrivilege 2164 powershell.exe Token: SeDebugPrivilege 2460 powershell.exe Token: SeDebugPrivilege 2288 powershell.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeDebugPrivilege 3972 powershell.exe Token: SeDebugPrivilege 1920 powershell.exe Token: SeDebugPrivilege 2488 powershell.exe Token: SeDebugPrivilege 748 powershell.exe Token: SeDebugPrivilege 3628 powershell.exe Token: SeDebugPrivilege 5068 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 3308 powershell.exe Token: SeDebugPrivilege 2468 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2912 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 90 PID 4948 wrote to memory of 2912 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 90 PID 2912 wrote to memory of 1256 2912 csc.exe 92 PID 2912 wrote to memory of 1256 2912 csc.exe 92 PID 4948 wrote to memory of 4828 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 93 PID 4948 wrote to memory of 4828 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 93 PID 4828 wrote to memory of 4472 4828 csc.exe 95 PID 4828 wrote to memory of 4472 4828 csc.exe 95 PID 4948 wrote to memory of 3308 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 96 PID 4948 wrote to memory of 3308 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 96 PID 4948 wrote to memory of 4820 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 97 PID 4948 wrote to memory of 4820 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 97 PID 4948 wrote to memory of 4212 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 98 PID 4948 wrote to memory of 4212 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 98 PID 4948 wrote to memory of 2288 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 99 PID 4948 wrote to memory of 2288 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 99 PID 4948 wrote to memory of 5068 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 100 PID 4948 wrote to memory of 5068 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 100 PID 4948 wrote to memory of 1988 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 101 PID 4948 wrote to memory of 1988 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 101 PID 4948 wrote to memory of 1248 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 102 PID 4948 wrote to memory of 1248 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 102 PID 4948 wrote to memory of 2644 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 103 PID 4948 wrote to memory of 2644 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 103 PID 4948 wrote to memory of 3972 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 105 PID 4948 wrote to memory of 3972 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 105 PID 4948 wrote to memory of 3628 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 106 PID 4948 wrote to memory of 3628 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 106 PID 4948 wrote to memory of 1928 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 108 PID 4948 wrote to memory of 1928 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 108 PID 4948 wrote to memory of 2488 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 110 PID 4948 wrote to memory of 2488 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 110 PID 4948 wrote to memory of 748 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 113 PID 4948 wrote to memory of 748 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 113 PID 4948 wrote to memory of 4964 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 114 PID 4948 wrote to memory of 4964 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 114 PID 4948 wrote to memory of 2604 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 115 PID 4948 wrote to memory of 2604 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 115 PID 4948 wrote to memory of 2460 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 116 PID 4948 wrote to memory of 2460 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 116 PID 4948 wrote to memory of 1920 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 117 PID 4948 wrote to memory of 1920 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 117 PID 4948 wrote to memory of 2164 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 118 PID 4948 wrote to memory of 2164 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 118 PID 4948 wrote to memory of 4492 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 132 PID 4948 wrote to memory of 4492 4948 22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe 132 PID 4492 wrote to memory of 5964 4492 cmd.exe 134 PID 4492 wrote to memory of 5964 4492 cmd.exe 134 PID 4492 wrote to memory of 5676 4492 cmd.exe 135 PID 4492 wrote to memory of 5676 4492 cmd.exe 135 PID 4492 wrote to memory of 2468 4492 cmd.exe 136 PID 4492 wrote to memory of 2468 4492 cmd.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe"C:\Users\Admin\AppData\Local\Temp\22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dzkfqrrj\dzkfqrrj.cmdline"2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES460.tmp" "c:\Program Files (x86)\Microsoft\Edge\Application\CSC28667D592A054CAB95A6A8605178985C.TMP"3⤵PID:1256
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\czv4yvkh\czv4yvkh.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES80A.tmp" "c:\Windows\System32\CSC815DFC59BD1C40B38645E35E3AB7544F.TMP"3⤵PID:4472
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/odt/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\msedge.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Cookies\sihost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\System\winlogon.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ShellComponents\StartMenuExperienceHost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\msedge.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cmDFbQQIZ6.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:5964
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:5676
-
-
C:\Users\Admin\AppData\Local\Temp\22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe"C:\Users\Admin\AppData\Local\Temp\22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5076 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵
- Executes dropped EXE
PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD532ab4b601a2fb45b7ec5cd3d1229222c
SHA193687b9a64d5646c855d91cee43325f12684a179
SHA25633ea2f46d2818cf6f3cf1d21007ea034cf26055a803a6e4c0efd19d96872c8dd
SHA5127e2990227f829fba607ed2d2f925caf7c376fa75455f04e53a3043c87c503733f8e4e8d033a8f4223a6772c4837f39f91ecc31f9c5f848e226ec6895958a9c7d
-
Filesize
1.9MB
MD517eb4c4e58353a5db52602d0ae321fbd
SHA1791e65e864b8831b86149c079b09d04cac894e59
SHA25622ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1
SHA512a93540c9b59a5000ef53834ff920d8fafa3e1d25da92ead4d523dc684d3824a6e3ccefda736194c0ec1a2e27229ea4096afd65be3ff462fd2e4f22c6058d8d14
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\22ed346e6e5849b9a4ddc0f372382b062fe50145a4425562976531eb2b0819e1.exe.log
Filesize1KB
MD518da49c97c362515aa00f9d0b966f403
SHA11974d473a06114342e171ca707c86c8303ab168a
SHA2561747424c1eba45d3539d08f84a8f02149ea969ef380a6c6d13a5cc3fe963e684
SHA512d1ca8005f1f5ac652696ae1b03d5c27b243300525e2dbd6db89da1f1c43cc55553982f3edc5501261e461aa9e8063418c1760f070366d1dddec4e6dc159a6d87
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
944B
MD559d97011e091004eaffb9816aa0b9abd
SHA11602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA25618f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6
-
Filesize
944B
MD5aaaac7c68d2b7997ed502c26fd9f65c2
SHA17c5a3731300d672bf53c43e2f9e951c745f7fbdf
SHA2568724dc2c3c8e8f17aeefae44a23741b1ea3b43c490fbc52fd61575ffe1cd82bb
SHA512c526febd9430413b48bed976edd9a795793ad1f06c8ff4f6b768b4ad63f4d2f06b9da72d4fcfa7cb9530a64e2dc3554f5ad97fd0ab60129701d175f2724ef1ac
-
Filesize
944B
MD517fbfbe3f04595e251287a6bfcdc35de
SHA1b576aabfd5e6d5799d487011506ed1ae70688987
SHA2562e61ae727ca01496c9418a65777d6d7e05a85cbdb6b3a19516857442e5bd2da0
SHA512449c68512d90a17f598e9dacfd6230e6e97bc6bfaaf2b06f3b91b370ece92e2322b81ee3721e288880fa1f05470156e519256e3f03d786c3b28a39788f5e0ad6
-
Filesize
944B
MD585502ce8813f7174d5989a982a473094
SHA1767982aed807f5f28ad7037139db874adebae5ed
SHA256df0b71db6a6f78fcea4a935928560506f0c099e75aba717fd04cc9226d720ec6
SHA512224ba8f3fc1d9a04bceb006af989f2838f4253074ba58b9082c7761daa1067e9d742ae51212d9116c89bda346538e8806790121deacf67a1c7b4a81bc95e6f9f
-
Filesize
944B
MD5293a5e452e148112857e22e746feff34
SHA17a5018bf98a3e38970809531288a7e3efb979532
SHA25605e48657fb5340817f522c955b379cfb639977480af3ab1414682e9bf6616551
SHA5127332f2b22f4ab64bb67c1a493f7cf2b378e311d5be6c6c99339210d4e9022c17f01a698333cd679a0776cca23460e28ec88c2ccfcf50c732ee218ef25ab19049
-
Filesize
1KB
MD5d5e1713b21e9fc37c531178f2f15c2ce
SHA1b63116cfcb57b92dd707d6cea0b8a63d22543019
SHA256fbb1a873d289fad7318c2968d38ce9a045ac3880610c4914591481918af5e6c6
SHA5127422a1589db44815709720fb22dc84562ac06910bc3e56496e54968115dc2b074ba454f4dc253f537a60588fdfd7ea7f220a016596932ac7d2ff0244a19c1856
-
Filesize
1KB
MD57306f0b5a2ea81af0b184f74a810bb75
SHA17c2cd74b64565eec471f945038f253f5a69d607f
SHA256a564a30e5a0fc59bb9e1ddab82364bfeae5814255e091cc53f4c4ea16a1ffb08
SHA512acdd442e6c710bc7dfb40ec9722b7dc63bed14b52f7167eded25440a6c395e3192f40678dea883a9a2057e3383c9d40343bd384caed9ce2d3c43ba5f155ab98a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
230B
MD5b1fec322a8259ea4a70e623f2f4f5191
SHA1c21f6c8f2152429535d1bbc20dde5e0e2366becc
SHA256c738d0ae9d6364774b8e76326ea1416e087de7475b6b2f6b7a2155b714cba504
SHA512a639013ed1fc68325c19253ac751e8516b986e93a25a09cfdf886373a640e91a91afb16a58e5233dbc8db6c17a444db045434f8cebc7aaf59e57f03c19aa96de
-
Filesize
1KB
MD5b5189fb271be514bec128e0d0809c04e
SHA15dd625d27ed30fca234ec097ad66f6c13a7edcbe
SHA256e1984ba1e3ff8b071f7a320a6f1f18e1d5f4f337d31dc30d5bdfb021df39060f
SHA512f0fcb8f97279579beb59f58ea89527ee0d86a64c9de28300f14460bec6c32dda72f0e6466573b6654a1e992421d6fe81ae7cce50f27059f54cf9fdca6953602e
-
Filesize
364B
MD546f192a29fdc7e0c8415f3a3102dcce3
SHA1de061e12b5a28225b609f9a9727a68d50b61ccbe
SHA2569d96f00aad2b2aa6d6bf34283076520bb0ebd89167aea02dd11da7a264bcea89
SHA51258b74b1f19acd899b2639d93c665b3894b9c4e820d10759968dda7fef161955d9889621050e2d228cddff74070d9984460431b0564a4a7a2ece6200578c97da6
-
Filesize
235B
MD505a219bfc9c35f0a6056549a2a02fd57
SHA15a3144d4d022048a39948a3a98bce1f49b3ad947
SHA2564565687fdb5323b6254c13936918490267c6dc96ee508c4468ae71853dfaa038
SHA512750e7cdbed90e9b578b0bf422c9cc0e864528d398b4fbea641e1e85031e4685ff928381cb656d416f646fe217cbbb949b69f70a0ec4306a997e8a62eba0ac092
-
Filesize
394B
MD5fe67d87c95ccb9afd0640aeabb4bc6fe
SHA14073a215c74748778bbe22bd54e3deb2c0387c6d
SHA2567b5878332ad2feb1321841cfacc09b631dcbb15fbde894f7d674b2e440b7f3ed
SHA51235dcf55da34690a7696485607beb07ab7f31fb203c1ab57c401697706bbe7b55a9250d21ca5e85f14c22f4e4c95d9c2d930662c31163b490afd350ac0c3ab7ee
-
Filesize
265B
MD597402ed6270ba261838f351dba183971
SHA16955124ad03a9b0c7d24d8f339454798ee1f6eee
SHA256c3da8fae61d044eed0542dce42be69a678a0c9e132a07a2d53919dd10909d1cc
SHA5129de7f67f0a420da6f5e83ce1b70c9aba9352b3ad6c1103795160b5c1e892fc294ff6dfb8dce3a3ead6c7adf607613ad70fd9e841068e7d74076bdb2fadd1e44e
-
Filesize
1KB
MD5188249e3f31caa0264351fc374794895
SHA1323a707d1a37ac8cbae6d6e502cc850f69ae2e15
SHA2561bf68148c555d0e84720c497dcf3ad708da300ee7472df12c9307a3acd4abde1
SHA51228a0d97e83b6b6d10c0114166e8f23845663a34c8f262aa5a31ffb885abe232badb6f95bba99b8688559cac81f8ff93c3609ac363d8903d35f535d7c5e1e02d5