Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 17:01
Static task
static1
Behavioral task
behavioral1
Sample
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe
Resource
win7-20240508-en
General
-
Target
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe
-
Size
708KB
-
MD5
a7073a3267e29df0e36f16760942c4da
-
SHA1
9fb42b03685673a6936643673036a0832b90d039
-
SHA256
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632
-
SHA512
b7323bc3de45540cec738cf94b87bd6cb942e889126ca9f680731f1899ef95ab90cbd0fa240b562cbb9c9c4d275f29173e85accbfc183a39045e0c70ff358419
-
SSDEEP
12288:lJFZqYMOaQ0q9nV/zsnK23KHVI6nodVdyMLiqyVcxwtVxgpMiuzOTIfwj7LD5fe:zFZqhOBnVyK23C6OoYMLiVcKtVx4Miu9
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Processes:
resource yara_rule behavioral2/memory/3604-3-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-6-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-8-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-5-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-7-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-1-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-9-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-15-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-14-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-19-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-20-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-21-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-37-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-38-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-49-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-50-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-58-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-59-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-64-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-70-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-72-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-80-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-81-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-92-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-93-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-94-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-98-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-100-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-102-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-103-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-105-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-107-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-114-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-115-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-117-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-119-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-120-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-122-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-143-0x0000000002390000-0x000000000341E000-memory.dmp upx behavioral2/memory/3604-144-0x0000000002390000-0x000000000341E000-memory.dmp upx -
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process File opened (read-only) \??\W: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\w: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\n: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\t: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\I: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\K: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\P: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\T: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\Y: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\e: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\o: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\M: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\Q: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\S: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\g: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\H: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\L: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\V: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\q: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\p: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\z: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\G: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\N: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\O: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\R: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\U: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\k: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\m: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\s: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\y: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\E: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\J: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\X: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\b: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\l: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\v: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\x: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\Z: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\a: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\i: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\j: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\r: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\u: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\h: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process File opened for modification \??\PhysicalDrive0 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process File opened for modification C:\autorun.inf 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened for modification F:\autorun.inf 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Drops file in Program Files directory 12 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Drops file in Windows directory 1 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exemsedge.exemsedge.exeidentity_helper.exepid process 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 1688 msedge.exe 1688 msedge.exe 5052 msedge.exe 5052 msedge.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 1960 identity_helper.exe 1960 identity_helper.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription pid process Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exemsedge.exepid process 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exemsedge.exepid process 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exepid process 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exeexplorer.exemsedge.exedescription pid process target process PID 3604 wrote to memory of 764 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe fontdrvhost.exe PID 3604 wrote to memory of 772 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe fontdrvhost.exe PID 3604 wrote to memory of 60 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe dwm.exe PID 3604 wrote to memory of 2976 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe sihost.exe PID 3604 wrote to memory of 3060 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe svchost.exe PID 3604 wrote to memory of 760 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe taskhostw.exe PID 3604 wrote to memory of 3428 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Explorer.EXE PID 3604 wrote to memory of 3568 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe svchost.exe PID 3604 wrote to memory of 3760 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe DllHost.exe PID 3604 wrote to memory of 3860 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe StartMenuExperienceHost.exe PID 3604 wrote to memory of 3924 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe RuntimeBroker.exe PID 3604 wrote to memory of 4004 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe SearchApp.exe PID 3604 wrote to memory of 3460 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe RuntimeBroker.exe PID 3604 wrote to memory of 4900 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe TextInputHost.exe PID 3604 wrote to memory of 4860 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe RuntimeBroker.exe PID 3604 wrote to memory of 952 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe backgroundTaskHost.exe PID 3604 wrote to memory of 3848 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe backgroundTaskHost.exe PID 3604 wrote to memory of 5116 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe explorer.exe PID 3604 wrote to memory of 5116 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe explorer.exe PID 3604 wrote to memory of 5116 3604 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe explorer.exe PID 408 wrote to memory of 5052 408 explorer.exe msedge.exe PID 408 wrote to memory of 5052 408 explorer.exe msedge.exe PID 5052 wrote to memory of 4520 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 4520 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 2464 5052 msedge.exe msedge.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe"C:\Users\Admin\AppData\Local\Temp\599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe "http://localhost:80"3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://localhost/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedf2146f8,0x7ffedf214708,0x7ffedf2147183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5032905861690367349,11024042476546199413,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,5032905861690367349,11024042476546199413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,5032905861690367349,11024042476546199413,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5032905861690367349,11024042476546199413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5032905861690367349,11024042476546199413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,5032905861690367349,11024042476546199413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,5032905861690367349,11024042476546199413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5032905861690367349,11024042476546199413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5032905861690367349,11024042476546199413,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5032905861690367349,11024042476546199413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5032905861690367349,11024042476546199413,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5032905861690367349,11024042476546199413,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2540 /prefetch:23⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD56f4acbce797e512118568af05e05139c
SHA1906bfcea1ad9bbf43bbf56ea8477b689902b70d1
SHA25662f1ee2501399709463e5644fc07a70226719f87073573585e6fa21514bd2315
SHA512282c9fa48cf87ae23e05606b6429c87005fee7ee68e083bf829b9ee70f953a9debfc18d18924970ca0f4ba6cac8304f7f2de01727c0d0d9c20515792f15eea98
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD58ebc614be7b4da8f18cf3beb1f20cf9c
SHA1c0ba938ded2f994087443c67bf74122d6858a6e1
SHA25688bc9aad498cbbed7a2b5544c3a51fa0ceb103b2af2cd30085c9094558cee00d
SHA5128f859f39db48d11245bba2c23e904c4da84c147f70ee114ca4ee21aa07815a1fdea08e892a409e13d6d7b314db652cc9361882a09a07a5b830715a3d32c510c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5bf1ce09d88338c3979213df907989bb9
SHA17ea48ec082a000501099c2c5b089cec069966daa
SHA2567cc9775e6e48f33dae53e57690a066218f8b5c3d663b571fca1feb9da5d1c1e4
SHA51211120aa6d396b385900c1ace55cf8d6537b0ad4766bcc8e537841c2c677ccc816690bffa631aa693ed37ae7c7a67791ccaf4a1c352345e5ee90c11629b388ac9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5071e81e8275487d5b2651e1bcfa48ee7
SHA1136574f47a24dee33a5c044b6123cbd2803ed557
SHA256ba5dff1213578fee126210aa1e4f8a41bb04b628bc9525f47e2836af063b88cb
SHA5121c292dedb5744afc5ec208a941100cb0e10070c35e07d3ae6b5bbb0f9db89b8f3e484289efd0a90eb5f8ffcc7d5b44006b226852a0e78c7d968c46b64f19dd59
-
F:\iown.exeFilesize
96KB
MD5416d1e8e86e76c54e1dd80032aff9114
SHA1e6fad4f71676438639a2d40bbf250a0485180d0d
SHA256b3c1a9606e038a980ee4deb25a6f1c6c2d29fae385bc2444c250e70ea601b4ce
SHA512acaddc621a891f631d56ad36cb025f55ad7ef59886a326de947a7bd87b09ed5afb10e4cf6e340867ed2c93e44251e5dd8b1a593e88958bb060ace570fc18d1c9
-
\??\pipe\LOCAL\crashpad_5052_IRCYSWDUJZVAHODUMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/3604-63-0x0000000000400000-0x00000000005A9000-memory.dmpFilesize
1.7MB
-
memory/3604-8-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-5-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-7-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-1-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-13-0x0000000000670000-0x0000000000672000-memory.dmpFilesize
8KB
-
memory/3604-9-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-15-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-12-0x0000000000670000-0x0000000000672000-memory.dmpFilesize
8KB
-
memory/3604-14-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-19-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-20-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-21-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-37-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-38-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-49-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-50-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-58-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-59-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-11-0x0000000000AB0000-0x0000000000AB1000-memory.dmpFilesize
4KB
-
memory/3604-64-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-70-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-72-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-10-0x0000000000670000-0x0000000000672000-memory.dmpFilesize
8KB
-
memory/3604-80-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-81-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-6-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-92-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-93-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-94-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-98-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-100-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-102-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-103-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-105-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-107-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-114-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-115-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-117-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-119-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-120-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-122-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-3-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-143-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-144-0x0000000002390000-0x000000000341E000-memory.dmpFilesize
16.6MB
-
memory/3604-145-0x0000000000670000-0x0000000000672000-memory.dmpFilesize
8KB
-
memory/3604-0-0x0000000000400000-0x00000000005A9000-memory.dmpFilesize
1.7MB