Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 11:35
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
Loader.exe
Resource
win10v2004-20240508-en
General
-
Target
Loader.exe
-
Size
353KB
-
MD5
da4a981460566d93b7c25f1527c5d321
-
SHA1
ad0dc4e6192057d2f80b080741cdfea83c399a0b
-
SHA256
fbfa20ca6337fbe8f71ebab5e3328af667b9e9f4ad56ec7669e502f19e4f6905
-
SHA512
06d57ca29fb36c3c17f275485a69e58d3bb51a543f7dc96945122ad2108967a7995373ead8ce86eb9efc8131e1ae41dd2ac62cd02acb1933eac494e1ba1c6c93
-
SSDEEP
6144:ujwCtJxxb+fFgfWNIQudUChHCDomqrnBTcqRVhh69NhSzN+9Im:ujwC/xxpONIFFHCDVqpcqpc9zZO
Malware Config
Signatures
-
Detect ZGRat V1 4 IoCs
Processes:
resource yara_rule behavioral2/files/0x00090000000122be-8.dat family_zgrat_v1 behavioral2/files/0x0009000000015ce3-31.dat family_zgrat_v1 behavioral2/memory/2332-32-0x00000000012C0000-0x0000000001662000-memory.dmp family_zgrat_v1 behavioral2/memory/2264-136-0x0000000001200000-0x00000000015A2000-memory.dmp family_zgrat_v1 -
Modifies WinLogon for persistence 2 TTPs 5 IoCs
Processes:
Sessionperf.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Windows Photo Viewer\\ja-JP\\csrss.exe\", \"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Idle.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\Sessionperf.exe\"" Sessionperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Windows Photo Viewer\\ja-JP\\csrss.exe\", \"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Idle.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\Sessionperf.exe\", \"C:\\MSOCache\\All Users\\sppsvc.exe\"" Sessionperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Windows Photo Viewer\\ja-JP\\csrss.exe\", \"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Idle.exe\", \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\Sessionperf.exe\", \"C:\\MSOCache\\All Users\\sppsvc.exe\", \"C:\\Recovery\\3e6c2342-cc12-11ee-878b-7662d560f583\\winlogon.exe\"" Sessionperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Windows Photo Viewer\\ja-JP\\csrss.exe\"" Sessionperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Windows Photo Viewer\\ja-JP\\csrss.exe\", \"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Idle.exe\"" Sessionperf.exe -
Process spawned unexpected child process 13 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2504 2148 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 2148 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 528 2148 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 576 2148 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 2148 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 2148 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 536 2148 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1264 2148 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 2148 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 2148 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2012 2148 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2892 2148 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 2148 schtasks.exe 35 -
XMRig Miner payload 9 IoCs
Processes:
resource yara_rule behavioral2/memory/2996-192-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2996-195-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2996-194-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2996-196-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2996-193-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2996-190-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2996-189-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2996-197-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2996-198-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 2876 powershell.exe 836 powershell.exe 1188 powershell.exe 2280 powershell.exe 1868 powershell.exe 1864 powershell.exe 2328 powershell.exe -
Creates new service(s) 2 TTPs
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
Checker.exeUtility.exeSessionperf.exesppsvc.exelhhsgwktkatl.exepid Process 3040 Checker.exe 2580 Utility.exe 2332 Sessionperf.exe 2264 sppsvc.exe 484 2672 lhhsgwktkatl.exe -
Loads dropped DLL 5 IoCs
Processes:
Loader.execmd.exepid Process 2836 Loader.exe 2836 Loader.exe 2500 cmd.exe 2500 cmd.exe 484 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2996-186-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-188-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-184-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-192-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-185-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-195-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-194-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-196-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-193-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-190-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-189-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-187-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-197-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2996-198-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
Sessionperf.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Recovery\\3e6c2342-cc12-11ee-878b-7662d560f583\\winlogon.exe\"" Sessionperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows Photo Viewer\\ja-JP\\csrss.exe\"" Sessionperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Windows Photo Viewer\\ja-JP\\csrss.exe\"" Sessionperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Sessionperf = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\Sessionperf.exe\"" Sessionperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\MSOCache\\All Users\\sppsvc.exe\"" Sessionperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\MSOCache\\All Users\\sppsvc.exe\"" Sessionperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Recovery\\3e6c2342-cc12-11ee-878b-7662d560f583\\winlogon.exe\"" Sessionperf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Idle.exe\"" Sessionperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Idle.exe\"" Sessionperf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sessionperf = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\Sessionperf.exe\"" Sessionperf.exe -
Drops file in System32 directory 6 IoCs
Processes:
lhhsgwktkatl.execsc.exepowershell.exeUtility.exepowershell.exedescription ioc Process File opened for modification C:\Windows\system32\MRT.exe lhhsgwktkatl.exe File created \??\c:\Windows\System32\CSC790CB13E2FDD44DCBBF44A39CFA75D73.TMP csc.exe File created \??\c:\Windows\System32\oin92z.exe csc.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe Utility.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
lhhsgwktkatl.exedescription pid Process procid_target PID 2672 set thread context of 2204 2672 lhhsgwktkatl.exe 103 PID 2672 set thread context of 2996 2672 lhhsgwktkatl.exe 105 -
Drops file in Program Files directory 3 IoCs
Processes:
Sessionperf.exedescription ioc Process File created C:\Program Files\Windows Photo Viewer\ja-JP\csrss.exe Sessionperf.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\csrss.exe Sessionperf.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\886983d96e3d3e Sessionperf.exe -
Drops file in Windows directory 2 IoCs
Processes:
wusa.exewusa.exedescription ioc Process File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 2684 sc.exe 1568 sc.exe 1716 sc.exe 1752 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 908 schtasks.exe 2012 schtasks.exe 576 schtasks.exe 2504 schtasks.exe 2044 schtasks.exe 528 schtasks.exe 2312 schtasks.exe 536 schtasks.exe 2892 schtasks.exe 3024 schtasks.exe 1508 schtasks.exe 1264 schtasks.exe 1804 schtasks.exe 1732 schtasks.exe 2300 schtasks.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
powershell.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = d0d10df4f2a5da01 powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
sppsvc.exepid Process 2264 sppsvc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Sessionperf.exepid Process 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe 2332 Sessionperf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
sppsvc.exepid Process 2264 sppsvc.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
Loader.exeSessionperf.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exesppsvc.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.execonhost.exedescription pid Process Token: SeDebugPrivilege 2836 Loader.exe Token: SeDebugPrivilege 2332 Sessionperf.exe Token: SeDebugPrivilege 836 powershell.exe Token: SeDebugPrivilege 1868 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 1188 powershell.exe Token: SeDebugPrivilege 1864 powershell.exe Token: SeDebugPrivilege 2264 sppsvc.exe Token: SeDebugPrivilege 2328 powershell.exe Token: SeShutdownPrivilege 2668 powercfg.exe Token: SeShutdownPrivilege 2704 powercfg.exe Token: SeShutdownPrivilege 2632 powercfg.exe Token: SeShutdownPrivilege 2708 powercfg.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeShutdownPrivilege 2212 powercfg.exe Token: SeShutdownPrivilege 1740 powercfg.exe Token: SeShutdownPrivilege 1260 powercfg.exe Token: SeShutdownPrivilege 3000 powercfg.exe Token: SeLockMemoryPrivilege 2996 conhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
sppsvc.exepid Process 2264 sppsvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Loader.exeChecker.exeWScript.execmd.exeSessionperf.execsc.execmd.execmd.exelhhsgwktkatl.exedescription pid Process procid_target PID 2836 wrote to memory of 3040 2836 Loader.exe 28 PID 2836 wrote to memory of 3040 2836 Loader.exe 28 PID 2836 wrote to memory of 3040 2836 Loader.exe 28 PID 2836 wrote to memory of 3040 2836 Loader.exe 28 PID 3040 wrote to memory of 2596 3040 Checker.exe 29 PID 3040 wrote to memory of 2596 3040 Checker.exe 29 PID 3040 wrote to memory of 2596 3040 Checker.exe 29 PID 3040 wrote to memory of 2596 3040 Checker.exe 29 PID 2836 wrote to memory of 2580 2836 Loader.exe 30 PID 2836 wrote to memory of 2580 2836 Loader.exe 30 PID 2836 wrote to memory of 2580 2836 Loader.exe 30 PID 2596 wrote to memory of 2500 2596 WScript.exe 31 PID 2596 wrote to memory of 2500 2596 WScript.exe 31 PID 2596 wrote to memory of 2500 2596 WScript.exe 31 PID 2596 wrote to memory of 2500 2596 WScript.exe 31 PID 2500 wrote to memory of 2380 2500 cmd.exe 33 PID 2500 wrote to memory of 2380 2500 cmd.exe 33 PID 2500 wrote to memory of 2380 2500 cmd.exe 33 PID 2500 wrote to memory of 2380 2500 cmd.exe 33 PID 2500 wrote to memory of 2332 2500 cmd.exe 34 PID 2500 wrote to memory of 2332 2500 cmd.exe 34 PID 2500 wrote to memory of 2332 2500 cmd.exe 34 PID 2500 wrote to memory of 2332 2500 cmd.exe 34 PID 2332 wrote to memory of 2612 2332 Sessionperf.exe 39 PID 2332 wrote to memory of 2612 2332 Sessionperf.exe 39 PID 2332 wrote to memory of 2612 2332 Sessionperf.exe 39 PID 2612 wrote to memory of 1452 2612 csc.exe 41 PID 2612 wrote to memory of 1452 2612 csc.exe 41 PID 2612 wrote to memory of 1452 2612 csc.exe 41 PID 2332 wrote to memory of 1864 2332 Sessionperf.exe 54 PID 2332 wrote to memory of 1864 2332 Sessionperf.exe 54 PID 2332 wrote to memory of 1864 2332 Sessionperf.exe 54 PID 2332 wrote to memory of 836 2332 Sessionperf.exe 55 PID 2332 wrote to memory of 836 2332 Sessionperf.exe 55 PID 2332 wrote to memory of 836 2332 Sessionperf.exe 55 PID 2332 wrote to memory of 1868 2332 Sessionperf.exe 56 PID 2332 wrote to memory of 1868 2332 Sessionperf.exe 56 PID 2332 wrote to memory of 1868 2332 Sessionperf.exe 56 PID 2332 wrote to memory of 2280 2332 Sessionperf.exe 59 PID 2332 wrote to memory of 2280 2332 Sessionperf.exe 59 PID 2332 wrote to memory of 2280 2332 Sessionperf.exe 59 PID 2332 wrote to memory of 1188 2332 Sessionperf.exe 60 PID 2332 wrote to memory of 1188 2332 Sessionperf.exe 60 PID 2332 wrote to memory of 1188 2332 Sessionperf.exe 60 PID 2332 wrote to memory of 1544 2332 Sessionperf.exe 64 PID 2332 wrote to memory of 1544 2332 Sessionperf.exe 64 PID 2332 wrote to memory of 1544 2332 Sessionperf.exe 64 PID 1544 wrote to memory of 1952 1544 cmd.exe 66 PID 1544 wrote to memory of 1952 1544 cmd.exe 66 PID 1544 wrote to memory of 1952 1544 cmd.exe 66 PID 1544 wrote to memory of 2788 1544 cmd.exe 67 PID 1544 wrote to memory of 2788 1544 cmd.exe 67 PID 1544 wrote to memory of 2788 1544 cmd.exe 67 PID 1544 wrote to memory of 2264 1544 cmd.exe 68 PID 1544 wrote to memory of 2264 1544 cmd.exe 68 PID 1544 wrote to memory of 2264 1544 cmd.exe 68 PID 1544 wrote to memory of 2264 1544 cmd.exe 68 PID 1544 wrote to memory of 2264 1544 cmd.exe 68 PID 2660 wrote to memory of 2880 2660 cmd.exe 83 PID 2660 wrote to memory of 2880 2660 cmd.exe 83 PID 2660 wrote to memory of 2880 2660 cmd.exe 83 PID 2672 wrote to memory of 2204 2672 lhhsgwktkatl.exe 103 PID 2672 wrote to memory of 2204 2672 lhhsgwktkatl.exe 103 PID 2672 wrote to memory of 2204 2672 lhhsgwktkatl.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Checker.exe"C:\Users\Admin\AppData\Local\Temp\Checker.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\blockcontainerWincrtdll\SFUqxLlNpV20NJ9uCnUYCbrkrl1WOe98n.vbe"3⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\blockcontainerWincrtdll\TudTneFnbF0PE5UTQ8BUoLqStO6.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f5⤵
- Modifies registry key
PID:2380
-
-
C:\blockcontainerWincrtdll\Sessionperf.exe"C:\blockcontainerWincrtdll/Sessionperf.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zsdpzco1\zsdpzco1.cmdline"6⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3F90.tmp" "c:\Windows\System32\CSC790CB13E2FDD44DCBBF44A39CFA75D73.TMP"7⤵PID:1452
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Photo Viewer\ja-JP\csrss.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\LocalLow\Sun\Idle.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\Sessionperf.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\sppsvc.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\3e6c2342-cc12-11ee-878b-7662d560f583\winlogon.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2I5Rqlqdos.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:1952
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2788
-
-
C:\MSOCache\All Users\sppsvc.exe"C:\MSOCache\All Users\sppsvc.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2264
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Utility.exe"C:\Users\Admin\AppData\Local\Temp\Utility.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2580 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵
- Drops file in Windows directory
PID:2880
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "QHRAJGDI"3⤵
- Launches sc.exe
PID:2684
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "QHRAJGDI" binpath= "C:\ProgramData\nalfdgwigwyg\lhhsgwktkatl.exe" start= "auto"3⤵
- Launches sc.exe
PID:1568
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:1716
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "QHRAJGDI"3⤵
- Launches sc.exe
PID:1752
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Photo Viewer\ja-JP\csrss.exe'" /f1⤵
- Creates scheduled task(s)
PID:1508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Photo Viewer\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\LocalLow\Sun\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Admin\AppData\LocalLow\Sun\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\LocalLow\Sun\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SessionperfS" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\Sessionperf.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Sessionperf" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\Sessionperf.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SessionperfS" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\Sessionperf.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Recovery\3e6c2342-cc12-11ee-878b-7662d560f583\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\3e6c2342-cc12-11ee-878b-7662d560f583\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Recovery\3e6c2342-cc12-11ee-878b-7662d560f583\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2312
-
C:\ProgramData\nalfdgwigwyg\lhhsgwktkatl.exeC:\ProgramData\nalfdgwigwyg\lhhsgwktkatl.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:1712
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:1628
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2204
-
-
C:\Windows\system32\conhost.execonhost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208B
MD56275c3c3b7e84e0b6705168f3087ecc4
SHA1b786ae47a8c492b80c9545520090464b6ca1fec3
SHA25632533ed0f9fe1e44814c958f068998744d0a459ba0ace8dbff2f5e3038173dd2
SHA512dc3d3ed71671befff05c026f7b45f2f86b1700a09478901bff0cbe9f05552d57bb05b377c26238fed15477ac2446ee249e0823356c5e29246c8b8dfc89d1b93f
-
Filesize
3.9MB
MD51003b37d9d942d41a38a83670eaa285c
SHA1a4ee7ef69fc681caf1116d59578667abb9080ad6
SHA256d822b616ee7e10b00fead9be9eb0cf9780fdb0b3fec3001ff31c9ce0cb7255ae
SHA5120c6f4e063cc22ee3c076c95bf5ea1cb593e5b6f40e4f2b8d3723a5c18c14eeecf568dad2a16599967c56588f4918cecd996e475fd20615b07c99de4800309f9a
-
Filesize
1KB
MD55341dd35e10a3bea45a5c99015077030
SHA1232cdacbd3d201f1b204b0e960d3968142128902
SHA2560b573525f38fc343f6f5df6d7df7415362380d62fb48158e6b1b71290ce16fcd
SHA512d47a13fc05edf14aad5719c09080a26633270d80973b4137aad3c8a9d00690072bdbf0f2fc103cd9b2f78b8444e6b4a8d189f33baab0255b10b8da29cbb63226
-
Filesize
5.0MB
MD5b1ac2ea973651a70ea72597e13a10f0a
SHA107e7cdedc54067a46b1d42cdf8a2c9050c3d3419
SHA256e2cb500c902da55ac07cbfbe30b8d1cef8781e55f0439ed601672636c3ab8c47
SHA51202b0dbc8a31ca440027a6c07d618a92bb520567ccd338c28dfcb86faa5b56c866564cf1a05b1754dcfeb252d12d76da57fd2de87804454f0ef1097431764c1f0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5047a318715969a67640389a2ac4865b3
SHA1e943f2991c9a354d206f79969edaf671e936480b
SHA256bcacc19efd87a3c914f3fb3ed3b3960e2025911f8f65f68fd0427862366d93e4
SHA512d8f0bfa9a43167edec6d86be839b9a100242331dd0ca0836cf2144762cb6d324ba554bbd6004072a9727df5cd8d0607fdf47f097f8ded5526117ca4271339a9d
-
Filesize
228B
MD54f702b152f4098393712e3fe99b04fbd
SHA1fec2f913e1fac5053127e175f1ba048c9d8dd25c
SHA256f0e2bfb22d22aed8ac10eff5a010fad081a5798706b3a6fd7764798cab716eb2
SHA5127c0844d6591b694d77ecf3d070eb3f70fd99427e41d62167aa58c98c1966a8065d90beb82ab0aa0a42bb80edb3c205dd07bb1d4fc03d989a0cb4df8993635fbf
-
Filesize
3.6MB
MD5bf0f63bb48eb95aaec6fc6a001c974ce
SHA119baab2b0c129ecbd6a1aa21bada3e2e5cdd1136
SHA256bbb080aed81b8f4d0f5d590c7cb0e56e68da5a27d32d964c32e50e1cb2015edc
SHA512130f08a7c4901ef47e7d21effe83c19fa442f2ade97967c11e646f949a9e8c2c46e8272a31a5b75f6c279009530cd101a562f1ab31a28fe410273cd69bf6c28c
-
Filesize
201B
MD5159297f9e35114bf97d74622097780d8
SHA12aaaf993b9ecb9bae43ccd41585734512ff08355
SHA256650c37c1afde471e40f77d7aec8603382214e9ec318b7f08ab7653f9c4e87f81
SHA512a82faa2f64caf669d44eac03705e34bea213c9a74ed73950bd8d2158d1c256ca290b7ffece866c3a03c36a091be70d92157353782061e184e5d44ac937949f69
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
385B
MD508fc57d31514ba3975b30cf2a60d16c3
SHA144d1fc6cbf6654345c254ad3c96651c85bf03923
SHA256582fa4802e33141ae82d9831e2059c4c6d2a30e767a341dbbbdfccd204240db0
SHA512dbb90ee79fa5a69d23d2e627baddbcbb2e44cac066d1b0f3f3e95b2a1dcf8e8bf5667c9a5642ee3790fe46c338d397b6112ac34baa6f8fa250da37ce6c411fce
-
Filesize
235B
MD551e10e4d0b59484b543ac7cb72531d5c
SHA1d0c488be9ea22099eb249b8720a0acd30d4200e1
SHA2567f6a9340b014d6da83c7a835070dbacad3757461fc2f5db97b7cb6ebe50caa3d
SHA5124d3e61e1cd97b3d07b48adb5ac6018aee02ea067e4ddb8358ff4989a154affa0e063acc4627bb27720fe00bfc16e5bb07a424056238e79abf49b6e22cd4cac11
-
Filesize
1KB
MD51c0f7844f7e250162f11df610012cc1f
SHA12ee0b2ac51be783b0d196868edc6a1fe7a0af068
SHA256988d255e5988f6b4de58f1eb852279c5974974d18d47af4dccb89cacff4cc020
SHA5123b323f3a51f44e5dc73f7f54cecb39de91fdb6ea64965fb2e84764297e2856e86c9751c71bb5d549f322547c9b383a13f16775d32e8c9333a66a11739d5e3f6d