Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-06-2024 13:57
Behavioral task
behavioral1
Sample
af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe
Resource
win11-20240508-en
General
-
Target
af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe
-
Size
6.0MB
-
MD5
a20727b81b50a20483ba59ae65443dfe
-
SHA1
7429f81064e044e981de12bde015117953b7b0e7
-
SHA256
af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c
-
SHA512
c6b857207818f1e26065ac424ee5cfdb18e5297ae8c1724a5ec8e80cf96b43bcd31b479859fa863ff508030ce52c60870152b433d548df9fbfc42a378c499856
-
SSDEEP
98304:RLGSThOfTCiFBXmfFs+JMHpCVoR8oMEOJ6Ty3RvX+Y2naq8le+:YBfTCiUswVSLOJgyBG/aW+
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1896-410-0x0000000000400000-0x00000000009B6000-memory.dmp xmrig -
Boot or Logon Autostart Execution: Port Monitors 1 TTPs 12 IoCs
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
Processes:
spoolsv.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint\OfflinePorts spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\USB Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\IPP spoolsv.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3168 netsh.exe -
ACProtect 1.3x - 1.4x DLL software 13 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI12242\python27.dll acprotect C:\Users\Admin\AppData\Local\Temp\_MEI12~1\Crypto.Cipher._AES.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI12242\_ctypes.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI12242\_socket.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI12242\_ssl.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI12242\_hashlib.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI12~1\psutil._psutil_windows.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI12~1\netifaces.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI12~1\win32service.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI12~1\pywintypes27.dll acprotect C:\Users\Admin\AppData\Local\Temp\_MEI12~1\win32api.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI12~1\win32event.pyd acprotect C:\Users\Admin\AppData\Local\Temp\_MEI12~1\servicemanager.pyd acprotect -
Executes dropped EXE 7 IoCs
Processes:
HelpPane.exeHelpPane.exeHelpPane.exeHelpPane.exeHelpPane.exeHelpPane.exexmrig.exepid process 2380 HelpPane.exe 336 HelpPane.exe 1096 HelpPane.exe 728 HelpPane.exe 1940 HelpPane.exe 5012 HelpPane.exe 1896 xmrig.exe -
Loads dropped DLL 62 IoCs
Processes:
af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exeHelpPane.exeHelpPane.exeHelpPane.exepid process 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 336 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 728 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI12242\python27.dll upx behavioral2/memory/1260-34-0x0000000074EB0000-0x0000000075160000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI12~1\Crypto.Cipher._AES.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI12242\_ctypes.pyd upx behavioral2/memory/1260-40-0x0000000010000000-0x000000001000E000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI12242\_socket.pyd upx behavioral2/memory/1260-46-0x0000000074C50000-0x0000000074DB9000-memory.dmp upx behavioral2/memory/1260-45-0x0000000074DC0000-0x0000000074DD1000-memory.dmp upx behavioral2/memory/1260-44-0x0000000074DE0000-0x0000000074DFD000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI12242\_ssl.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI12242\_hashlib.pyd upx behavioral2/memory/1260-49-0x0000000074B40000-0x0000000074C47000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI12~1\psutil._psutil_windows.pyd upx behavioral2/memory/1260-53-0x00000000039F0000-0x0000000003A04000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI12~1\netifaces.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI12~1\win32service.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI12~1\pywintypes27.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI12~1\win32api.pyd upx behavioral2/memory/1260-64-0x000000001ECB0000-0x000000001ECC1000-memory.dmp upx behavioral2/memory/1260-63-0x0000000003CA0000-0x0000000003CAA000-memory.dmp upx behavioral2/memory/1260-65-0x000000001E7A0000-0x000000001E7C7000-memory.dmp upx behavioral2/memory/1260-66-0x000000001E8C0000-0x000000001E8E1000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI12~1\win32event.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI12~1\servicemanager.pyd upx behavioral2/memory/1260-71-0x000000001E9B0000-0x000000001E9BD000-memory.dmp upx behavioral2/memory/1260-72-0x000000001E7D0000-0x000000001E7DE000-memory.dmp upx behavioral2/memory/1260-113-0x0000000074DE0000-0x0000000074DFD000-memory.dmp upx behavioral2/memory/336-114-0x00000000746B0000-0x0000000074960000-memory.dmp upx behavioral2/memory/336-121-0x0000000074690000-0x00000000746AD000-memory.dmp upx behavioral2/memory/1260-122-0x0000000074C50000-0x0000000074DB9000-memory.dmp upx behavioral2/memory/336-120-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/1260-119-0x0000000074EB0000-0x0000000075160000-memory.dmp upx behavioral2/memory/1260-127-0x0000000074DC0000-0x0000000074DD1000-memory.dmp upx behavioral2/memory/336-129-0x0000000074500000-0x0000000074669000-memory.dmp upx behavioral2/memory/336-128-0x0000000074670000-0x0000000074681000-memory.dmp upx behavioral2/memory/336-132-0x00000000743F0000-0x00000000744F7000-memory.dmp upx behavioral2/memory/1260-136-0x00000000039F0000-0x0000000003A04000-memory.dmp upx behavioral2/memory/336-137-0x00000000028B0000-0x00000000028C4000-memory.dmp upx behavioral2/memory/1260-147-0x000000001E7A0000-0x000000001E7C7000-memory.dmp upx behavioral2/memory/336-150-0x000000001E7A0000-0x000000001E7C7000-memory.dmp upx behavioral2/memory/336-151-0x000000001E8C0000-0x000000001E8E1000-memory.dmp upx behavioral2/memory/336-149-0x000000001ECB0000-0x000000001ECC1000-memory.dmp upx behavioral2/memory/336-148-0x00000000028D0000-0x00000000028DA000-memory.dmp upx behavioral2/memory/336-154-0x000000001E9B0000-0x000000001E9BD000-memory.dmp upx behavioral2/memory/336-157-0x000000001E7D0000-0x000000001E7DE000-memory.dmp upx behavioral2/memory/336-158-0x00000000746B0000-0x0000000074960000-memory.dmp upx behavioral2/memory/336-171-0x0000000074690000-0x00000000746AD000-memory.dmp upx behavioral2/memory/336-181-0x000000001E9B0000-0x000000001E9BD000-memory.dmp upx behavioral2/memory/336-180-0x000000001E8C0000-0x000000001E8E1000-memory.dmp upx behavioral2/memory/336-179-0x000000001E7A0000-0x000000001E7C7000-memory.dmp upx behavioral2/memory/336-178-0x000000001ECB0000-0x000000001ECC1000-memory.dmp upx behavioral2/memory/336-177-0x00000000028D0000-0x00000000028DA000-memory.dmp upx behavioral2/memory/336-176-0x00000000028B0000-0x00000000028C4000-memory.dmp upx behavioral2/memory/336-175-0x00000000743F0000-0x00000000744F7000-memory.dmp upx behavioral2/memory/336-174-0x0000000074500000-0x0000000074669000-memory.dmp upx behavioral2/memory/336-173-0x0000000074670000-0x0000000074681000-memory.dmp upx behavioral2/memory/336-172-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/728-233-0x00000000746B0000-0x0000000074960000-memory.dmp upx behavioral2/memory/728-234-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/728-235-0x0000000074690000-0x00000000746AD000-memory.dmp upx behavioral2/memory/728-236-0x0000000074670000-0x0000000074681000-memory.dmp upx behavioral2/memory/728-237-0x0000000074500000-0x0000000074669000-memory.dmp upx behavioral2/memory/728-238-0x00000000743F0000-0x00000000744F7000-memory.dmp upx behavioral2/memory/728-239-0x0000000002E40000-0x0000000002E54000-memory.dmp upx -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\HelpPane.exe pyinstaller -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
spoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID spoolsv.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1448 taskkill.exe -
Modifies data under HKEY_USERS 22 IoCs
Processes:
spoolsv.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
HelpPane.exepid process 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe 5012 HelpPane.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exeHelpPane.exeHelpPane.exetaskkill.exexmrig.exedescription pid process Token: SeDebugPrivilege 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe Token: SeDebugPrivilege 336 HelpPane.exe Token: SeDebugPrivilege 728 HelpPane.exe Token: SeDebugPrivilege 1448 taskkill.exe Token: SeLockMemoryPrivilege 1896 xmrig.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exeaf94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.execmd.exeHelpPane.execmd.exeHelpPane.exeHelpPane.exeHelpPane.execmd.exedescription pid process target process PID 1224 wrote to memory of 1260 1224 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe PID 1224 wrote to memory of 1260 1224 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe PID 1224 wrote to memory of 1260 1224 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe PID 1260 wrote to memory of 588 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe cmd.exe PID 1260 wrote to memory of 588 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe cmd.exe PID 1260 wrote to memory of 588 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe cmd.exe PID 1260 wrote to memory of 4840 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe cmd.exe PID 1260 wrote to memory of 4840 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe cmd.exe PID 1260 wrote to memory of 4840 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe cmd.exe PID 4840 wrote to memory of 2380 4840 cmd.exe HelpPane.exe PID 4840 wrote to memory of 2380 4840 cmd.exe HelpPane.exe PID 4840 wrote to memory of 2380 4840 cmd.exe HelpPane.exe PID 2380 wrote to memory of 336 2380 HelpPane.exe HelpPane.exe PID 2380 wrote to memory of 336 2380 HelpPane.exe HelpPane.exe PID 2380 wrote to memory of 336 2380 HelpPane.exe HelpPane.exe PID 1260 wrote to memory of 248 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe cmd.exe PID 1260 wrote to memory of 248 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe cmd.exe PID 1260 wrote to memory of 248 1260 af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe cmd.exe PID 248 wrote to memory of 1096 248 cmd.exe HelpPane.exe PID 248 wrote to memory of 1096 248 cmd.exe HelpPane.exe PID 248 wrote to memory of 1096 248 cmd.exe HelpPane.exe PID 1096 wrote to memory of 728 1096 HelpPane.exe HelpPane.exe PID 1096 wrote to memory of 728 1096 HelpPane.exe HelpPane.exe PID 1096 wrote to memory of 728 1096 HelpPane.exe HelpPane.exe PID 1940 wrote to memory of 5012 1940 HelpPane.exe HelpPane.exe PID 1940 wrote to memory of 5012 1940 HelpPane.exe HelpPane.exe PID 1940 wrote to memory of 5012 1940 HelpPane.exe HelpPane.exe PID 5012 wrote to memory of 4676 5012 HelpPane.exe cmd.exe PID 5012 wrote to memory of 4676 5012 HelpPane.exe cmd.exe PID 5012 wrote to memory of 4676 5012 HelpPane.exe cmd.exe PID 4676 wrote to memory of 1448 4676 cmd.exe taskkill.exe PID 4676 wrote to memory of 1448 4676 cmd.exe taskkill.exe PID 4676 wrote to memory of 1448 4676 cmd.exe taskkill.exe PID 5012 wrote to memory of 2900 5012 HelpPane.exe cmd.exe PID 5012 wrote to memory of 2900 5012 HelpPane.exe cmd.exe PID 5012 wrote to memory of 2900 5012 HelpPane.exe cmd.exe PID 5012 wrote to memory of 5060 5012 HelpPane.exe cmd.exe PID 5012 wrote to memory of 5060 5012 HelpPane.exe cmd.exe PID 5012 wrote to memory of 5060 5012 HelpPane.exe cmd.exe PID 5012 wrote to memory of 1896 5012 HelpPane.exe xmrig.exe PID 5012 wrote to memory of 1896 5012 HelpPane.exe xmrig.exe PID 5012 wrote to memory of 1896 5012 HelpPane.exe xmrig.exe PID 5012 wrote to memory of 3168 5012 HelpPane.exe netsh.exe PID 5012 wrote to memory of 3168 5012 HelpPane.exe netsh.exe PID 5012 wrote to memory of 3168 5012 HelpPane.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe"C:\Users\Admin\AppData\Local\Temp\af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe"C:\Users\Admin\AppData\Local\Temp\af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy /y C:\Users\Admin\AppData\Local\Temp\af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c.exe C:\Users\Admin\HelpPane.exe3⤵PID:588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\HelpPane.exe --startup auto install3⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\HelpPane.exeC:\Users\Admin\HelpPane.exe --startup auto install4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\HelpPane.exeC:\Users\Admin\HelpPane.exe --startup auto install5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\HelpPane.exe start3⤵
- Suspicious use of WriteProcessMemory
PID:248 -
C:\Users\Admin\HelpPane.exeC:\Users\Admin\HelpPane.exe start4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\HelpPane.exeC:\Users\Admin\HelpPane.exe start5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
-
-
-
C:\Users\Admin\HelpPane.exe"C:\Users\Admin\HelpPane.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\HelpPane.exe"C:\Users\Admin\HelpPane.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /pid 2088 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 2088 /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy /y C:\Windows\TEMP\_MEI19~1\xmrig.exe C:\Windows\TEMP\xmrig.exe3⤵PID:2900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy /y C:\Windows\TEMP\_MEI19~1\config.json C:\Windows\TEMP\config.json3⤵PID:5060
-
-
C:\Windows\TEMP\xmrig.exeC:\Windows\TEMP\xmrig.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\Users\Admin\HelpPane.exe "MyApp" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3168
-
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Boot or Logon Autostart Execution: Port Monitors
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:1944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Port Monitors
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Port Monitors
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD56cb8b560efbc381651d2045f1571d7c8
SHA115283a7a467adb7b6d7a7182f660dd783f90e483
SHA2566456fea123e04bcec8a8eed26160e1df5482e69d187d3e1a0c428995472ac134
SHA512ca2958095e8e08b5ef05ec9de15b7d1eb180923a40b90356db56a124101c96d8e745001948b89dbe9d6b9ce3c2029f7e9eaf20c73fa1d410a821d6605830bfc0
-
Filesize
343KB
MD5ee134421fbabeb565e4f3ca721331c2e
SHA14b03bdd142c6a7bb6f74abe968c5b76b63e06059
SHA2567863e1bedfe1ffc720b67b2eb7b3491db9d2b8e56b5574e6a40ff90336b8dafa
SHA512d27ff65b6a8bf2e5e70d2865e72eee6930e76c2a3990428c54fc998743d3c540c5c984b5d1429e8ffbe3d160ae1f6782cd6d3ca40822f81d2052ba168595d1fa
-
Filesize
21KB
MD5be47363992c7dd90019276d35fa8da76
SHA1ccf7ebbe829da08efd95a53d4ba0c0d4938f6169
SHA256be10254b111713bef20a13d561de61ca3c74a34c64ddc5b10825c64ab2c46734
SHA512573f9111535a9a136fcaaa5c1a16c347f7327626768d849513d69c9848406b1002dcc5b8c17a291ef2e6519587533ca806018ee471a39d330f032a9e7e635ea7
-
Filesize
487KB
MD568c3ad86e0a8833c29ad1be10d3c025d
SHA104488362814b2f3ae07c4e8df8e45868d48b447f
SHA256c236271b92a0f1d3304337f2e2444107f34d8e26272981f48c47db347133566c
SHA512bb2819d913033cc26dcd1e5cbf015dacdbf747d29c72bfd41bfe0d74bb77e51a61cf9be4b67b6348938837125f1d0f80af0ac33531e00cea1585535952a22785
-
Filesize
1KB
MD5b5dea49b86c5bb5d9cd8d64a09f70065
SHA1487ef676ebd244ebc3cf197f70da7a5e393fb96e
SHA25678b1160f6adab34d144ad19a0f4b83f83453f1e18460bbdfbe17ad354b62af7d
SHA5121b5914f4c52f47a33c57f5f6428482e6766099bf43d4e8616ce4aabc4a917c24b2e0c98c841f0d7e7b8a202f40ff960885535539bf70cc7c7ed8687c7ece010c
-
Filesize
877KB
MD58c44826a640b3cf0b32b0258c65fee07
SHA1e3f9fe6366d0876bfa8b903b20d2acf06416f1bc
SHA256fbad053d962bac96865ac3372958d697711800fdc46f36c87011bb5e89026614
SHA512884e2c01c088b9ae86d4605fed1cf8e9b17f99cf887efc5644f4a91959ecd89148cca3e9fdaa6ab9e8c4dfd2d61dbdfd442a95b13dab7e5cd027b4782d473355
-
Filesize
16KB
MD5371397e80a55d432da47311b8ef25317
SHA171617777d6a2500d6464d7b394c8be5f1e4e119e
SHA256c1a900615c9500c46b9602c30c53f299290b03632208ef1152af8830ab73ad17
SHA5123139e2848acf02cc8475449f213873d2c2b7196f6a55c70d2d8f8b487020387740364e5ca0aa584624d1b9b01b965146a2f0e15eef34830c7c0ecbb8637dae03
-
Filesize
11KB
MD5c7807680a69196c3ee66c4cfb3e271ac
SHA1d3ea74c9e3b810c6a1ee4296b97e20f2f45c9461
SHA2561a6c57ac8031582477b1d3463a65b6eb006eea704e27c8c4b812b99ea910428d
SHA512a5d893132ad889e98b434da7fd5ca377afb1800fd8d3230cced5e9fde576fcec943dd22fa48810ba6d93c510ebaa8ac5a94ec1b9d639fd6c533c5bbd4737cf15
-
Filesize
25KB
MD52fc800fcc46a597921c2ed447aeb09ac
SHA172004227e5c60c8460f835a170798aa22861b79e
SHA2562e4ad3d08118da77c928c4614bfecb34397cfaf53f5d46d7c7e5f1da3172c1f1
SHA512a17022b364615b45a1873aea0de922a2988e4d75a8f4e63ecb9ca7dd46263e684b1f28b82bd77b046bbe2ad03ce65c5dacf98eaccae861a30f137e0118a87225
-
Filesize
52KB
MD507b436bfa1c7b4ffc21fb39358158060
SHA17f5a47cdab9a7d93bbbd204cedffca61d3f80c84
SHA25682c2926cb03a04392fa479801d505e2a387446bca978ff930177121db2fdb461
SHA51213ebcb83f478c859ca808003933769b84290e108648b69f33043653263c5b4bd37ed5ca8d521b46a1d9122eb232f7e5d05a25e16f250d5573cf85cd5cdefb2ef
-
Filesize
16KB
MD56a95bcf45e4be23cc2634ef5bad17660
SHA17d13b791588cb800c2add75ff8e74c3c493a8143
SHA25660da4b4e628b7dc1115615128ac554aeb29b50a61629ad5aeeb5cc9d2bd86202
SHA512d3c80b025647444f42d42e82cad50c4383728f7f8c9e16aa9d87450ca864b0b97b5f8f47e80328a4a2b67ce7d06c9a8f1dae8c5b3c798de1b2a50164161e69c8
-
Filesize
34KB
MD542c475231f4835bb1a5f94b0d3da4520
SHA1fcfae296dd10c92d973a57d61bbf5c0f4a15ed6b
SHA25687ceeb1b7586db730f48988a07018f9c8af57934ff7f173a869542207f46b0f1
SHA512d1a699b8497e8843f990f6f719a904a7751fe2a9404cb195be2d94341728a7372cd93d379b576e6031980e1da53f2336805c6bf59e799b63565cd63d4931c02a
-
Filesize
11KB
MD5796306be7a1abcffb8853ee9ceb5beae
SHA193762cf53958a3a99b674986fcf3c53c489133ed
SHA25626e6d883e9e61bf872425526a9b8c7bb229c3b9d2f82bb3c0bf500660dbe1995
SHA5125919a837fa1fcaea91b14d02da306928d5e523e4591dca290422c9eb9be15f2ee626a8379f5c953f2b08e7a6b2cd67618652b9efa9ace8abd47a8bd7cd8c2f64
-
Filesize
18KB
MD5f23a62491bd945c050e3e1d13909e9e7
SHA1b8dac4e00163533157a17e3b56d05e049a2375a2
SHA256e52b5532a6764aaae67db557412b3f77ebdc8a14a72771a1c6414a83bb3fc15c
SHA51252200cf9687752db43bbae703192c841694d5bd976fa56c0f25e0478cfb97681bc77677c1a8907167612ddf9fe6a561945fbeb0180022670af97bf41b5b11766
-
Filesize
6.0MB
MD5a20727b81b50a20483ba59ae65443dfe
SHA17429f81064e044e981de12bde015117953b7b0e7
SHA256af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c
SHA512c6b857207818f1e26065ac424ee5cfdb18e5297ae8c1724a5ec8e80cf96b43bcd31b479859fa863ff508030ce52c60870152b433d548df9fbfc42a378c499856
-
Filesize
1KB
MD550cc63e4a1b24622cf61ed566b03e98f
SHA192e5874785bb76e4579559ba70e116a6149349f5
SHA256348f388c57dfb77b0caacd8304725e10dc69a52eec41ae695327787ad1853c92
SHA5129a291db9cf396687f3878590b1eb65cd7da2e6fc3d6de64a3b8cb08116b646371f432100e16b0ecd4f2916d05d67830f949ac2a3ca559a3a8d56616df2be98c7
-
Filesize
1.8MB
MD513bdd9cd9f7e51746172996262b5a873
SHA13834f8179abd7a827e927505f3c226ac8bbcf3ee
SHA2564bf737b29ff521bc263eb1f2c1c5ea04b47470cccd1beae245d98def389929bd
SHA51249879918505d042312f20b2fc8310a8c4a58aa266ed1ab05e0481f7e11385da0920cf9d756f842eb98e4394f14725385b74a99b38fc8a60222fa4cc873cb8040