Analysis
-
max time kernel
150s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
b172b565dc16b29af83689cf6a26f62372e33f2640109a4ddb15d89f6bff3e6d.msi
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b172b565dc16b29af83689cf6a26f62372e33f2640109a4ddb15d89f6bff3e6d.msi
Resource
win10v2004-20240704-en
General
-
Target
b172b565dc16b29af83689cf6a26f62372e33f2640109a4ddb15d89f6bff3e6d.msi
-
Size
2.3MB
-
MD5
a6b76f7da9d91576084c7d221327c662
-
SHA1
6186cf54c44bf03a5ca03584e422f7e3b520758f
-
SHA256
b172b565dc16b29af83689cf6a26f62372e33f2640109a4ddb15d89f6bff3e6d
-
SHA512
429cce1be05317d3e1898295f9c4c96d98aa8f86414a0436be8b198dbc25efc1195c6041ba2929e27bf3f66776794c8c744ea67b0cdc18a8076b57fb9d6fadb5
-
SSDEEP
49152:yBmjBI2riRojPOJJzhHC9th5U8aYUYtAY9ALLz+OW35ocqcMm6c5HFYw2:3jGJJ09T5U8aBYtrGz+OWJocqcIcD8
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000500000001a2eb-64.dat acprotect -
resource yara_rule behavioral1/files/0x000500000001a2ce-38.dat upx behavioral1/memory/3064-46-0x0000000000CF0000-0x0000000001056000-memory.dmp upx behavioral1/memory/3064-47-0x0000000000CF0000-0x0000000001056000-memory.dmp upx behavioral1/files/0x000500000001a2eb-64.dat upx behavioral1/memory/292-67-0x0000000074BC0000-0x0000000074C7A000-memory.dmp upx behavioral1/memory/3064-106-0x0000000000CF0000-0x0000000001056000-memory.dmp upx behavioral1/memory/292-107-0x0000000074BC0000-0x0000000074C7A000-memory.dmp upx -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\B: msiexec.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Thunder\5 msiexec.exe File created C:\Program Files (x86)\Microsoft Thunder\d msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft Thunder\wuauclts.exe cmd.exe File created C:\Program Files (x86)\Microsoft Thunder\wuaucltsCHS.dll cmd.exe File opened for modification C:\Program Files (x86)\Microsoft Thunder\zzsbas2.exe cmd.exe File created C:\Program Files (x86)\Microsoft Thunder\2 msiexec.exe File created C:\Program Files (x86)\Microsoft Thunder\3 msiexec.exe File created C:\Program Files (x86)\Microsoft Thunder\XamlHost.sys MsiExec.exe File opened for modification C:\Program Files (x86)\Microsoft Thunder\XamlHost.sys MsiExec.exe File created C:\Program Files (x86)\Microsoft Thunder\1 msiexec.exe File created C:\Program Files (x86)\Microsoft Thunder\e msiexec.exe File created C:\Program Files (x86)\Microsoft Thunder\wuauclts.exe cmd.exe File opened for modification C:\Program Files (x86)\Microsoft Thunder\wuaucltsCHS.dll cmd.exe File created C:\Program Files (x86)\Microsoft Thunder\zzsbas2.exe cmd.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI785B.tmp msiexec.exe File created C:\Windows\Installer\f787600.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\f7875fb.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\f7875fe.ipi msiexec.exe File opened for modification C:\Windows\Installer\f7875fe.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\f7875fb.msi msiexec.exe -
Executes dropped EXE 3 IoCs
pid Process 1892 wuauclts.exe 3064 zzsbas2.exe 292 ToDesk_Setup.exe -
Loads dropped DLL 6 IoCs
pid Process 2972 cmd.exe 1512 cmd.exe 3064 zzsbas2.exe 292 ToDesk_Setup.exe 292 ToDesk_Setup.exe 292 ToDesk_Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
pid Process 2304 msiexec.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2468 msiexec.exe 2468 msiexec.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe 3064 zzsbas2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2304 msiexec.exe Token: SeIncreaseQuotaPrivilege 2304 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeTakeOwnershipPrivilege 2468 msiexec.exe Token: SeSecurityPrivilege 2468 msiexec.exe Token: SeCreateTokenPrivilege 2304 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2304 msiexec.exe Token: SeLockMemoryPrivilege 2304 msiexec.exe Token: SeIncreaseQuotaPrivilege 2304 msiexec.exe Token: SeMachineAccountPrivilege 2304 msiexec.exe Token: SeTcbPrivilege 2304 msiexec.exe Token: SeSecurityPrivilege 2304 msiexec.exe Token: SeTakeOwnershipPrivilege 2304 msiexec.exe Token: SeLoadDriverPrivilege 2304 msiexec.exe Token: SeSystemProfilePrivilege 2304 msiexec.exe Token: SeSystemtimePrivilege 2304 msiexec.exe Token: SeProfSingleProcessPrivilege 2304 msiexec.exe Token: SeIncBasePriorityPrivilege 2304 msiexec.exe Token: SeCreatePagefilePrivilege 2304 msiexec.exe Token: SeCreatePermanentPrivilege 2304 msiexec.exe Token: SeBackupPrivilege 2304 msiexec.exe Token: SeRestorePrivilege 2304 msiexec.exe Token: SeShutdownPrivilege 2304 msiexec.exe Token: SeDebugPrivilege 2304 msiexec.exe Token: SeAuditPrivilege 2304 msiexec.exe Token: SeSystemEnvironmentPrivilege 2304 msiexec.exe Token: SeChangeNotifyPrivilege 2304 msiexec.exe Token: SeRemoteShutdownPrivilege 2304 msiexec.exe Token: SeUndockPrivilege 2304 msiexec.exe Token: SeSyncAgentPrivilege 2304 msiexec.exe Token: SeEnableDelegationPrivilege 2304 msiexec.exe Token: SeManageVolumePrivilege 2304 msiexec.exe Token: SeImpersonatePrivilege 2304 msiexec.exe Token: SeCreateGlobalPrivilege 2304 msiexec.exe Token: SeBackupPrivilege 2824 vssvc.exe Token: SeRestorePrivilege 2824 vssvc.exe Token: SeAuditPrivilege 2824 vssvc.exe Token: SeBackupPrivilege 2468 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeRestorePrivilege 2752 DrvInst.exe Token: SeRestorePrivilege 2752 DrvInst.exe Token: SeRestorePrivilege 2752 DrvInst.exe Token: SeRestorePrivilege 2752 DrvInst.exe Token: SeRestorePrivilege 2752 DrvInst.exe Token: SeRestorePrivilege 2752 DrvInst.exe Token: SeRestorePrivilege 2752 DrvInst.exe Token: SeLoadDriverPrivilege 2752 DrvInst.exe Token: SeLoadDriverPrivilege 2752 DrvInst.exe Token: SeLoadDriverPrivilege 2752 DrvInst.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeTakeOwnershipPrivilege 2468 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeTakeOwnershipPrivilege 2468 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeTakeOwnershipPrivilege 2468 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeTakeOwnershipPrivilege 2468 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeTakeOwnershipPrivilege 2468 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeTakeOwnershipPrivilege 2468 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeTakeOwnershipPrivilege 2468 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2304 msiexec.exe 2304 msiexec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1892 wuauclts.exe 1892 wuauclts.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2728 2468 msiexec.exe 33 PID 2468 wrote to memory of 2728 2468 msiexec.exe 33 PID 2468 wrote to memory of 2728 2468 msiexec.exe 33 PID 2468 wrote to memory of 2728 2468 msiexec.exe 33 PID 2468 wrote to memory of 2728 2468 msiexec.exe 33 PID 2468 wrote to memory of 2728 2468 msiexec.exe 33 PID 2468 wrote to memory of 2728 2468 msiexec.exe 33 PID 2728 wrote to memory of 2944 2728 MsiExec.exe 34 PID 2728 wrote to memory of 2944 2728 MsiExec.exe 34 PID 2728 wrote to memory of 2944 2728 MsiExec.exe 34 PID 2728 wrote to memory of 2944 2728 MsiExec.exe 34 PID 2728 wrote to memory of 2972 2728 MsiExec.exe 36 PID 2728 wrote to memory of 2972 2728 MsiExec.exe 36 PID 2728 wrote to memory of 2972 2728 MsiExec.exe 36 PID 2728 wrote to memory of 2972 2728 MsiExec.exe 36 PID 2728 wrote to memory of 1512 2728 MsiExec.exe 38 PID 2728 wrote to memory of 1512 2728 MsiExec.exe 38 PID 2728 wrote to memory of 1512 2728 MsiExec.exe 38 PID 2728 wrote to memory of 1512 2728 MsiExec.exe 38 PID 2972 wrote to memory of 1892 2972 cmd.exe 40 PID 2972 wrote to memory of 1892 2972 cmd.exe 40 PID 2972 wrote to memory of 1892 2972 cmd.exe 40 PID 2972 wrote to memory of 1892 2972 cmd.exe 40 PID 1512 wrote to memory of 3064 1512 cmd.exe 41 PID 1512 wrote to memory of 3064 1512 cmd.exe 41 PID 1512 wrote to memory of 3064 1512 cmd.exe 41 PID 1512 wrote to memory of 3064 1512 cmd.exe 41 PID 3064 wrote to memory of 292 3064 zzsbas2.exe 42 PID 3064 wrote to memory of 292 3064 zzsbas2.exe 42 PID 3064 wrote to memory of 292 3064 zzsbas2.exe 42 PID 3064 wrote to memory of 292 3064 zzsbas2.exe 42 PID 3064 wrote to memory of 292 3064 zzsbas2.exe 42 PID 3064 wrote to memory of 292 3064 zzsbas2.exe 42 PID 3064 wrote to memory of 292 3064 zzsbas2.exe 42 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\b172b565dc16b29af83689cf6a26f62372e33f2640109a4ddb15d89f6bff3e6d.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2304
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C7C1D7A5F5D047CEA8423C31F186AAF42⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c copy /b /y "C:\Program Files (x86)\Microsoft Thunder\1" + "C:\Program Files (x86)\Microsoft Thunder\2" + "C:\Program Files (x86)\Microsoft Thunder\d" "C:\Program Files (x86)\Microsoft Thunder\wuaucltsCHS.dll"3⤵
- Drops file in Program Files directory
PID:2944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c copy /b /y "C:\Program Files (x86)\Microsoft Thunder\1" + "C:\Program Files (x86)\Microsoft Thunder\2" + "C:\Program Files (x86)\Microsoft Thunder\e" "C:\Program Files (x86)\Microsoft Thunder\wuauclts.exe" && start "" "C:\Program Files (x86)\Microsoft Thunder\wuauclts.exe"3⤵
- Drops file in Program Files directory
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Microsoft Thunder\wuauclts.exe"C:\Program Files (x86)\Microsoft Thunder\wuauclts.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c copy /b "C:\Program Files (x86)\Microsoft Thunder\1" + "C:\Program Files (x86)\Microsoft Thunder\2" + "C:\Program Files (x86)\Microsoft Thunder\5" "C:\Program Files (x86)\Microsoft Thunder\zzsbas2.exe" && start "" "C:\Program Files (x86)\Microsoft Thunder\zzsbas2.exe"3⤵
- Drops file in Program Files directory
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Microsoft Thunder\zzsbas2.exe"C:\Program Files (x86)\Microsoft Thunder\zzsbas2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\Downloads\ToDesk_Setup.exe"C:\Users\Admin\Downloads\ToDesk_Setup.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:292
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005B8" "0000000000000594"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD57dcbdeb7c8cd258774d9755e0a8d6817
SHA158ae0d854eb8e1d056fddd38530a0fdc0c360bda
SHA25606562623a32e66b12f66d45e36e97cb18306ff1b61f94e844ee405afc5c66193
SHA512e2c8ff44f430141ec70dd5ebde3762d3b0c419124da3e79d5f480a3521698d8fa78aaa0881dfebecd7db037a5d150f82b21086ad4b4a0bbcb58a425ac1acd389
-
Filesize
1B
MD569691c7bdcc3ce6d5d8a1361f22d04ac
SHA1c63ae6dd4fc9f9dda66970e827d13f7c73fe841c
SHA25608f271887ce94707da822d5263bae19d5519cb3614e0daedc4c7ce5dab7473f1
SHA512253405e03b91441a6dd354a9b72e040068b1bfe10e83eb1a64a086c05525d8ccae2bf09130c624af50d55c3522a4fbb7c18cfc8dd843e5f4801d9ad2b5164b12
-
Filesize
1B
MD521c2e59531c8710156d34a3c30ac81d5
SHA1909f99a779adb66a76fc53ab56c7dd1caf35d0fd
SHA256bbeebd879e1dff6918546dc0c179fdde505f2a21591c9a9c96e36b054ec5af83
SHA5123225dff071cd0ccff736b0b159cc722963310c008472be814669451a062c25c5f7654f079d3e0ae1cf2fda1551a5a0b1f5e988383be7d383d57f73d4012c4024
-
Filesize
312KB
MD5723084dc960935fd88e95d7223699e53
SHA135a41d2c056852d5c1e118f6699238446c6ca5a6
SHA2568ca7f45f638fa2680020d13b78f58349f5584ab26c473a823c30fb96e9114ed1
SHA512d0cf007febcb3c1066d656f0d26485f281772e61c1e47489ce910bae2afa0dc9cb33f3a4c845bf0bc5cbdc3f8c07d31680cb5b08c51f1071f8f8b1ae55c37017
-
Filesize
1.5MB
MD5ef12dcaca96f9d128b285f02ebd8066a
SHA199ddb3b0585c193876628bceaebd059753d62cb1
SHA256613be57bb5a6cd308b56ba76d506bfbdfcc47e163d13622fe9ed5a062da26158
SHA512a2aed544ee743c51eba7e8d380fd80782063e87974d4fd8998d3e8fda3aaf880a637ea03596ba5e790800e27dffe54a4c625b32588ec59d28206ebf39b03006b
-
Filesize
608KB
MD5f294394cee9d4324edc61e7287c432f1
SHA1eaa7700d0866eae156eaf04c6c3578fdd98662e1
SHA256fa5cca6ad0e484a907aa870d3cbe8dce45bb36d150d7779b575a231c5f0e350d
SHA512be480cbd5405234ea3d69613221b3ad3b73d3b9d5f80df2ebbd58b91aa726527c262ce292d9796d54e7f4148cd984a959e42c46f9168448b38dd6d785faaba95
-
Filesize
1000KB
MD5101f4387e45aa6c2deed946a7e6aef37
SHA199c707373e30f10b33790bf99906afa44ef17c57
SHA2562e2543997a45c257db305846a5a85bffbf2a6f00f7eae2c8683dc59a90d59caf
SHA512b62a851fc06e749946200afcc69eb4325bd4afa4b0033da6855342d2cdd3334b04563b9da63be64c35db42c732c8bc9b973fdb858de19af26914be0b59bb9853
-
Filesize
733KB
MD5948fe68ee9b8c8439488064aafd7fa14
SHA11d3c1836103a331a163772ec4e4ccb9796cfae46
SHA25676d2aa1741af236e62428ae5732f305a8a945dd2318eea97dade0765e9241301
SHA512d9d97a209050a71f7801f8023aabb950e5f7ccc8a7d75e36aa1ae5151d729ba7eec6584c664e87d84723386e01c290153c1427399f6bdd1f7fc247d710a2d544
-
Filesize
2.3MB
MD5a6b76f7da9d91576084c7d221327c662
SHA16186cf54c44bf03a5ca03584e422f7e3b520758f
SHA256b172b565dc16b29af83689cf6a26f62372e33f2640109a4ddb15d89f6bff3e6d
SHA512429cce1be05317d3e1898295f9c4c96d98aa8f86414a0436be8b198dbc25efc1195c6041ba2929e27bf3f66776794c8c744ea67b0cdc18a8076b57fb9d6fadb5
-
Filesize
1000KB
MD5ef0b478c1900bada8c62d5fe87af5256
SHA1cfb9127848898dac833e91d160b17806967f01f9
SHA256df05aa6d969bb64da9e0a1128d86e53c6411da927aa82454fb518215d35fbd6e
SHA512b071597df9a9b25d9d548f15f0215d55b8bef1e9b2f9caa722bb2533942aca63f68e7227e473740b8c3791ab183395e4cd933297f2eba5fa7d5010a24805a50e
-
Filesize
1.5MB
MD59f096dd198d6bc62de3c1ce83fd0515b
SHA1e90953f5d8e7d960545578461d7bec5910618712
SHA2567d4da056d28a57a4c26eee1b36e59df55ea4f22bcf805d46482e5c91874fbf76
SHA512b8e06b7b57e5470049816f11df78e7589ddcbb99e25b4667f3e711e235584245cc7204a2fe9c555382646260f2f733cd4f75ead1197608da789adb523d890d95
-
Filesize
12KB
MD58cf2ac271d7679b1d68eefc1ae0c5618
SHA17cc1caaa747ee16dc894a600a4256f64fa65a9b8
SHA2566950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba
SHA512ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3
-
Filesize
287KB
MD5bb0cdff5ac2d64723007a0b4f7962a02
SHA1410889522ee8ea7308b054f71bc4cab078295e06
SHA25633e460a080a621cda7896e96b6f1beee802b485cf99e18b27463cd362c484b08
SHA512b4dc2614f01f5f01d5dec9e6a41e072d01e924d8a94ac0dc1050399fd1dc3cc8d53d7ccf162d750d166fca200771b0850191b30c7caada8edea9ba6d686e2402