Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
oxc.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
oxc.msi
Resource
win10v2004-20240508-en
General
-
Target
oxc.msi
-
Size
3.4MB
-
MD5
b1ae202dc4e66b9a125d28fe4680fe42
-
SHA1
f87422fa9ac8c2b52eb99f3616335c1484db8857
-
SHA256
c6de06a61756dc3b5d4ee71674d4132971fb7ed8db7b2e504905f23571ed7bf2
-
SHA512
dede0c88db06c4912d0e57fcba472b522eb6a2d2bbca62f8616bfa3df6c93301486172b03992a6dfefda77f4a89711c70dcc89c1d78e79574a7122f1c57b5ac1
-
SSDEEP
98304:DpkchD0ow0KHR8h/YM9dWhX+Rdx42lfyZc4vOKl4:ecFBw00R8h/YMauRr42lY2
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\HomeDLL = "C:\\Windows\\SysWOW64\\rundll32 /sta {AAE802DB-FB67-4407-A175-61223EFF30D4}" reg.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 2404 set thread context of 3068 2404 rundll32.exe WINDBVERS.EXE -
Drops file in Windows directory 10 IoCs
Processes:
msiexec.exeEXPAND.EXEDrvInst.exedescription ioc process File opened for modification C:\Windows\Installer\MSI3302.tmp msiexec.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log EXPAND.EXE File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\f7631ba.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log EXPAND.EXE File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\f7631ba.msi msiexec.exe File created C:\Windows\Installer\f7631bb.ipi msiexec.exe -
Executes dropped EXE 2 IoCs
Processes:
elevate.exeWINDBVERS.EXEpid process 2532 elevate.exe 3068 WINDBVERS.EXE -
Loads dropped DLL 10 IoCs
Processes:
MsiExec.exerundll32.exerundll32.exepid process 768 MsiExec.exe 768 MsiExec.exe 768 MsiExec.exe 768 MsiExec.exe 768 MsiExec.exe 1740 rundll32.exe 2404 rundll32.exe 2404 rundll32.exe 2404 rundll32.exe 2404 rundll32.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\InprocServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\WMProjectFiles\\soundtrack.ocx" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\InprocServer32\ThreadingModel = "Apartment" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1144 1740 WerFault.exe rundll32.exe -
Modifies data under HKEY_USERS 43 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe -
Modifies registry class 16 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node reg.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\ProgID reg.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\TypeLib reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\WMProjectFiles\\soundtrack.ocx" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\InprocServer32\ThreadingModel = "Apartment" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\ProgID\ = "functions.under_review" reg.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\ = "functions.under_review" reg.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\InprocServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\VERSION\ = "1.0" reg.exe Key created \Registry\User\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4} reg.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} reg.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\VERSION reg.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4} reg.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\Implemented Categories reg.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Wow6432Node\CLSID\{AAE802DB-FB67-4407-A175-61223EFF30D4}\Programmable reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msiexec.exepid process 2256 msiexec.exe 2256 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exedescription pid process Token: SeShutdownPrivilege 1808 msiexec.exe Token: SeIncreaseQuotaPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 2256 msiexec.exe Token: SeTakeOwnershipPrivilege 2256 msiexec.exe Token: SeSecurityPrivilege 2256 msiexec.exe Token: SeCreateTokenPrivilege 1808 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1808 msiexec.exe Token: SeLockMemoryPrivilege 1808 msiexec.exe Token: SeIncreaseQuotaPrivilege 1808 msiexec.exe Token: SeMachineAccountPrivilege 1808 msiexec.exe Token: SeTcbPrivilege 1808 msiexec.exe Token: SeSecurityPrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeLoadDriverPrivilege 1808 msiexec.exe Token: SeSystemProfilePrivilege 1808 msiexec.exe Token: SeSystemtimePrivilege 1808 msiexec.exe Token: SeProfSingleProcessPrivilege 1808 msiexec.exe Token: SeIncBasePriorityPrivilege 1808 msiexec.exe Token: SeCreatePagefilePrivilege 1808 msiexec.exe Token: SeCreatePermanentPrivilege 1808 msiexec.exe Token: SeBackupPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeShutdownPrivilege 1808 msiexec.exe Token: SeDebugPrivilege 1808 msiexec.exe Token: SeAuditPrivilege 1808 msiexec.exe Token: SeSystemEnvironmentPrivilege 1808 msiexec.exe Token: SeChangeNotifyPrivilege 1808 msiexec.exe Token: SeRemoteShutdownPrivilege 1808 msiexec.exe Token: SeUndockPrivilege 1808 msiexec.exe Token: SeSyncAgentPrivilege 1808 msiexec.exe Token: SeEnableDelegationPrivilege 1808 msiexec.exe Token: SeManageVolumePrivilege 1808 msiexec.exe Token: SeImpersonatePrivilege 1808 msiexec.exe Token: SeCreateGlobalPrivilege 1808 msiexec.exe Token: SeBackupPrivilege 1280 vssvc.exe Token: SeRestorePrivilege 1280 vssvc.exe Token: SeAuditPrivilege 1280 vssvc.exe Token: SeBackupPrivilege 2256 msiexec.exe Token: SeRestorePrivilege 2256 msiexec.exe Token: SeRestorePrivilege 2476 DrvInst.exe Token: SeRestorePrivilege 2476 DrvInst.exe Token: SeRestorePrivilege 2476 DrvInst.exe Token: SeRestorePrivilege 2476 DrvInst.exe Token: SeRestorePrivilege 2476 DrvInst.exe Token: SeRestorePrivilege 2476 DrvInst.exe Token: SeRestorePrivilege 2476 DrvInst.exe Token: SeLoadDriverPrivilege 2476 DrvInst.exe Token: SeLoadDriverPrivilege 2476 DrvInst.exe Token: SeLoadDriverPrivilege 2476 DrvInst.exe Token: SeRestorePrivilege 2256 msiexec.exe Token: SeTakeOwnershipPrivilege 2256 msiexec.exe Token: SeRestorePrivilege 2256 msiexec.exe Token: SeTakeOwnershipPrivilege 2256 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 1808 msiexec.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
rundll32.exerundll32.exeWINDBVERS.EXEpid process 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 2404 rundll32.exe 3068 WINDBVERS.EXE -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
msiexec.exeMsiExec.exerundll32.execmd.exerundll32.exedescription pid process target process PID 2256 wrote to memory of 768 2256 msiexec.exe MsiExec.exe PID 2256 wrote to memory of 768 2256 msiexec.exe MsiExec.exe PID 2256 wrote to memory of 768 2256 msiexec.exe MsiExec.exe PID 2256 wrote to memory of 768 2256 msiexec.exe MsiExec.exe PID 2256 wrote to memory of 768 2256 msiexec.exe MsiExec.exe PID 2256 wrote to memory of 768 2256 msiexec.exe MsiExec.exe PID 2256 wrote to memory of 768 2256 msiexec.exe MsiExec.exe PID 768 wrote to memory of 1612 768 MsiExec.exe ICACLS.EXE PID 768 wrote to memory of 1612 768 MsiExec.exe ICACLS.EXE PID 768 wrote to memory of 1612 768 MsiExec.exe ICACLS.EXE PID 768 wrote to memory of 1612 768 MsiExec.exe ICACLS.EXE PID 768 wrote to memory of 1228 768 MsiExec.exe EXPAND.EXE PID 768 wrote to memory of 1228 768 MsiExec.exe EXPAND.EXE PID 768 wrote to memory of 1228 768 MsiExec.exe EXPAND.EXE PID 768 wrote to memory of 1228 768 MsiExec.exe EXPAND.EXE PID 768 wrote to memory of 2108 768 MsiExec.exe reg.exe PID 768 wrote to memory of 2108 768 MsiExec.exe reg.exe PID 768 wrote to memory of 2108 768 MsiExec.exe reg.exe PID 768 wrote to memory of 2108 768 MsiExec.exe reg.exe PID 768 wrote to memory of 2532 768 MsiExec.exe elevate.exe PID 768 wrote to memory of 2532 768 MsiExec.exe elevate.exe PID 768 wrote to memory of 2532 768 MsiExec.exe elevate.exe PID 768 wrote to memory of 2532 768 MsiExec.exe elevate.exe PID 768 wrote to memory of 1740 768 MsiExec.exe rundll32.exe PID 768 wrote to memory of 1740 768 MsiExec.exe rundll32.exe PID 768 wrote to memory of 1740 768 MsiExec.exe rundll32.exe PID 768 wrote to memory of 1740 768 MsiExec.exe rundll32.exe PID 768 wrote to memory of 1740 768 MsiExec.exe rundll32.exe PID 768 wrote to memory of 1740 768 MsiExec.exe rundll32.exe PID 768 wrote to memory of 1740 768 MsiExec.exe rundll32.exe PID 1740 wrote to memory of 608 1740 rundll32.exe cmd.exe PID 1740 wrote to memory of 608 1740 rundll32.exe cmd.exe PID 1740 wrote to memory of 608 1740 rundll32.exe cmd.exe PID 1740 wrote to memory of 608 1740 rundll32.exe cmd.exe PID 608 wrote to memory of 1852 608 cmd.exe reg.exe PID 608 wrote to memory of 1852 608 cmd.exe reg.exe PID 608 wrote to memory of 1852 608 cmd.exe reg.exe PID 608 wrote to memory of 1852 608 cmd.exe reg.exe PID 1740 wrote to memory of 2404 1740 rundll32.exe rundll32.exe PID 1740 wrote to memory of 2404 1740 rundll32.exe rundll32.exe PID 1740 wrote to memory of 2404 1740 rundll32.exe rundll32.exe PID 1740 wrote to memory of 2404 1740 rundll32.exe rundll32.exe PID 1740 wrote to memory of 2404 1740 rundll32.exe rundll32.exe PID 1740 wrote to memory of 2404 1740 rundll32.exe rundll32.exe PID 1740 wrote to memory of 2404 1740 rundll32.exe rundll32.exe PID 2404 wrote to memory of 3068 2404 rundll32.exe WINDBVERS.EXE PID 2404 wrote to memory of 3068 2404 rundll32.exe WINDBVERS.EXE PID 2404 wrote to memory of 3068 2404 rundll32.exe WINDBVERS.EXE PID 2404 wrote to memory of 3068 2404 rundll32.exe WINDBVERS.EXE PID 2404 wrote to memory of 3068 2404 rundll32.exe WINDBVERS.EXE PID 2404 wrote to memory of 3068 2404 rundll32.exe WINDBVERS.EXE PID 2404 wrote to memory of 3068 2404 rundll32.exe WINDBVERS.EXE PID 2404 wrote to memory of 3068 2404 rundll32.exe WINDBVERS.EXE PID 2404 wrote to memory of 3068 2404 rundll32.exe WINDBVERS.EXE PID 1740 wrote to memory of 1144 1740 rundll32.exe WerFault.exe PID 1740 wrote to memory of 1144 1740 rundll32.exe WerFault.exe PID 1740 wrote to memory of 1144 1740 rundll32.exe WerFault.exe PID 1740 wrote to memory of 1144 1740 rundll32.exe WerFault.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\oxc.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1808
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 315224CF515E711700A1815676D924272⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-1c09dd7e-4b28-447f-8c46-b88dda8c9738\." /SETINTEGRITYLEVEL (CI)(OI)HIGH3⤵
- Modifies file permissions
PID:1612 -
C:\Windows\SysWOW64\EXPAND.EXE"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files3⤵
- Drops file in Windows directory
PID:1228 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "HomeDLL" /t REG_SZ /F /D "C:\Windows\SysWOW64\rundll32 /sta {AAE802DB-FB67-4407-A175-61223EFF30D4}"3⤵
- Adds Run key to start application
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\MW-1c09dd7e-4b28-447f-8c46-b88dda8c9738\files\elevate.exe"C:\Users\Admin\AppData\Local\Temp\MW-1c09dd7e-4b28-447f-8c46-b88dda8c9738\files\elevate.exe"3⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" MAFWIKFNMUI9430.ocx, RunDllEntryPointW3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cd C:\Users\Admin\AppData\Roaming\WMProjectFiles&®.exe import info.txt4⤵
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\reg.exereg.exe import info.txt5⤵
- Registers COM server for autorun
- Modifies registry class
PID:1852 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" /sta {AAE802DB-FB67-4407-A175-61223EFF30D4}4⤵
- Suspicious use of SetThreadContext
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Roaming\ProductConfigurations\WINDBVERS.EXEC:\Users\Admin\AppData\Roaming\ProductConfigurations\WINDBVERS.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 3564⤵
- Program crash
PID:1144
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003A8" "00000000000004CC"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD52f807297f7a507ae395dbad419499fe7
SHA1f6c3d7eb4ce30ac36ea14805a35c5d0e131af7a6
SHA256f2894b5e9cc70bdadd842ea5cce47539b9ebfbe7f1873626477168a698468978
SHA5129bc9e7a70a41c502833317506ddab8c723e76690346036da175e965ec85b72511b284e3cf1505be9a8ab8a6dc93834cacc8d1a26f5831846ab2bc4a9248c4d31
-
Filesize
3.1MB
MD57a969fb05e6382aa56fe5754e82fc179
SHA19f81731e391fadc79c170b4da2f01b21727e67be
SHA2561cbb6ed84195d88da51de5ecf1fd06815d10b582942fb92266b34ceb5f77e826
SHA512bc9926d8b073e0069caba3aba30302835ea90bc54d3cd7c284bacc08ad18f9523b13869c13b7e1861a77562a4e456f385067193fda5400eb79cfb9d3ac026069
-
Filesize
45KB
MD5f3260efd0b21dde6a808319149614ac7
SHA1c7aff49218b38624937742ac31854d77b086a55f
SHA2563c55e3e41d4b12815dc543ca653d3d22dd3466c604f47498f8661a29d4c0c44f
SHA5128d0602f072f12fe6a8fa73eabcc57712e95c72a4e32c144778b86d7b577b2cc1424e7dbf0e31bf6dc50787b25169dbe394d8c7d11e4fbffc96852dbb976e76cc
-
Filesize
13.0MB
MD53cc34d74677bcf9088c5c4666923476e
SHA1429543d90147dd60525a3f76513eb1b22194bf56
SHA2569c0e4999fcc2629ff921cc903b4bb3718f5983698b1c82826ac8b4a78117180b
SHA5125162f8a100bb0a3d43da77e3393994907dbc7e332d5a57f535729ab7332ee15482508e13273bc649c043a8aca5465aaec2cdd6e5c227f45f1baa7afe01d7b3b5
-
Filesize
7.9MB
MD5bd21b0b1a2448fe8017532d94561f4d9
SHA13a046d4893f0fe702fdd0023cb4366368afcfd40
SHA256759ae83bce7475dba576953992075942bcd6e1055e18555c9f9dfc81524107a2
SHA512dd97d88b422be7c6b89ee5aceee59b72996367564b00eadcd04d6fe9ca03265ecae016c5205f43448b76496ac154f61de9856f2c4eca408c034a8d521b64f00b
-
Filesize
116KB
MD5beeb28be4600b914647ef7cb8dbdda87
SHA1d36ce53c3703a2a438a253c9c90f71696fd0f909
SHA25625f473f312de5dab2f6f8959d46da75f0e9d14ce8741d5cdcc29b29889cc14b1
SHA51213de0290739236714b84c74f026e4a2614cf6cf2ab45c62397587eb7e56c2075f40c5a0d3ec4294b46b80582d623afd431b28e29b3a441bf4fa40892c2e5a05c
-
Filesize
1000B
MD5c63bd4cff6dd7c34e32c46d372fde002
SHA14590da674e9f87ba109ec64ebc18fe4e24c65032
SHA25601df3b4a70230a8eddd6334399f19864e218945adf2c42ce0c47f2be37482f18
SHA512d19a40a55bb39f25af4ea967083fbf721387a504bc10badab8c95ce890ab2102101732359b3d51ef48042712799628a63407f7856de6c4b04fa03d79cd0f7981
-
Filesize
1KB
MD5dc282a393ee3b3af7518e176917ace30
SHA1cd1fd9306614b9a770ad8047a2d7ed0218040c90
SHA256b108571afe16d7045c3e29fd3ae12829753c97adb5941e75518493b17f82cefe
SHA5126b6344b16c1e1ca7276c8e0c63d37493f5e2b4677838ca8c21565f71bf589e42193d89c7a925ca852ddd92c6162beee022f72bdf3de2a1edfcd07d0e353d3cea
-
Filesize
1KB
MD556a1ad1818fb3bd63db9c8c86d40884e
SHA189a599219c4017b88b097ddef64939c1ea2083a3
SHA256c8cb3dca3d91579f88e729e2a001869f0b4064246206a5be934834d77a831d56
SHA512757b4323be249c5b1196a4c75c4de4af91f0ae06e8a4a03d20b86db1f2f607ee756dcd04f8f55949948178685b586fe64c488e9bd72080d62bc84497fb415764
-
Filesize
1.3MB
MD5ecedc82a044dd6cce5e8dc1c811ea471
SHA111488750da5a36ca9bb531505fa55f789efc232a
SHA2568f4c32cfe1a449fd8bdb929025f61522c574e82a3667c936a306f35976efe2de
SHA512193c94332d49ba728a738e15b72a8c32bac2dca8909ff800bfa1f3136d91c9f0c9dee0cab748b4f3ad920d1c15ca62db5e50e313f99d1b8d580cc016a24ecf3d
-
Filesize
208KB
MD50c8921bbcc37c6efd34faf44cf3b0cb5
SHA1dcfa71246157edcd09eecaf9d4c5e360b24b3e49
SHA256fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1
SHA512ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108
-
Filesize
7.9MB
MD5b818d9388d7e8da45758e5a479ff8cc5
SHA1d273dd3d22285821eb3263e2c0d61300cfddea24
SHA2569254ba70d1139214015fbe3dee7edc1c68aeb0993fec0bd6cb14c30aff318f5c
SHA51211322b5dac590f8812ba0217e096588aaf6c9c2a5ca52b52e92b4be99554437a96ad0afd6a942a075d840fe2cbb800a6d5f2c42793217bbc4aeb28755554a516