Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe
Resource
win10v2004-20240709-en
General
-
Target
98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe
-
Size
262KB
-
MD5
d91a607df4a30a22d89c4d305cb0d7b3
-
SHA1
bc0a75faf4d36a2cfae9299fb21ed4ab1eba2acc
-
SHA256
98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347
-
SHA512
6c7e8f295026bab53dae095a36ba40236af2b25a78139e2cd12d3a77eb8513749578fce23dff0ace8ba6a7556e9e6e6d8a5f188ac7062d69a08bc27f2e6b22a7
-
SSDEEP
6144:sdZUUZyznmkyANv494D83X5Dw0jUVOv0KEEMHHEMHk:qaUZ+nmkyANv494D83XE8nMEME
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2760 Wallpapers.exe -
Executes dropped EXE 6 IoCs
pid Process 2760 Wallpapers.exe 2364 wmiintegrator.exe 2352 wmihostwin.exe 2716 wmimic.exe 2624 wmisecure.exe 2596 wmisecure64.exe -
Loads dropped DLL 6 IoCs
pid Process 2200 98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe 2760 Wallpapers.exe 2364 wmiintegrator.exe 2352 wmihostwin.exe 2716 wmimic.exe 2716 wmimic.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiintegrator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wallpapers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmihostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmimic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2200 98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe 2200 98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe 2200 98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe 2200 98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe 2200 98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe 2200 98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe 2760 Wallpapers.exe 2364 wmiintegrator.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe 2716 wmimic.exe 2716 wmimic.exe 2364 wmiintegrator.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe 2716 wmimic.exe 2716 wmimic.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe 2716 wmimic.exe 2716 wmimic.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe 2716 wmimic.exe 2716 wmimic.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe 2716 wmimic.exe 2716 wmimic.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe 2716 wmimic.exe 2716 wmimic.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe 2716 wmimic.exe 2716 wmimic.exe 2624 wmisecure.exe 2624 wmisecure.exe 2624 wmisecure.exe 2624 wmisecure.exe 2624 wmisecure.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe 2716 wmimic.exe 2716 wmimic.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe 2716 wmimic.exe 2716 wmimic.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe 2716 wmimic.exe 2716 wmimic.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe 2716 wmimic.exe 2716 wmimic.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe 2716 wmimic.exe 2716 wmimic.exe 2352 wmihostwin.exe 2364 wmiintegrator.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2760 2200 98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe 30 PID 2200 wrote to memory of 2760 2200 98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe 30 PID 2200 wrote to memory of 2760 2200 98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe 30 PID 2200 wrote to memory of 2760 2200 98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe 30 PID 2760 wrote to memory of 2364 2760 Wallpapers.exe 31 PID 2760 wrote to memory of 2364 2760 Wallpapers.exe 31 PID 2760 wrote to memory of 2364 2760 Wallpapers.exe 31 PID 2760 wrote to memory of 2364 2760 Wallpapers.exe 31 PID 2364 wrote to memory of 2352 2364 wmiintegrator.exe 32 PID 2364 wrote to memory of 2352 2364 wmiintegrator.exe 32 PID 2364 wrote to memory of 2352 2364 wmiintegrator.exe 32 PID 2364 wrote to memory of 2352 2364 wmiintegrator.exe 32 PID 2352 wrote to memory of 2716 2352 wmihostwin.exe 33 PID 2352 wrote to memory of 2716 2352 wmihostwin.exe 33 PID 2352 wrote to memory of 2716 2352 wmihostwin.exe 33 PID 2352 wrote to memory of 2716 2352 wmihostwin.exe 33 PID 2716 wrote to memory of 2624 2716 wmimic.exe 34 PID 2716 wrote to memory of 2624 2716 wmimic.exe 34 PID 2716 wrote to memory of 2624 2716 wmimic.exe 34 PID 2716 wrote to memory of 2624 2716 wmimic.exe 34 PID 2716 wrote to memory of 2596 2716 wmimic.exe 35 PID 2716 wrote to memory of 2596 2716 wmimic.exe 35 PID 2716 wrote to memory of 2596 2716 wmimic.exe 35 PID 2716 wrote to memory of 2596 2716 wmimic.exe 35 PID 2596 wrote to memory of 2836 2596 wmisecure64.exe 37 PID 2596 wrote to memory of 2836 2596 wmisecure64.exe 37 PID 2596 wrote to memory of 2836 2596 wmisecure64.exe 37 PID 2596 wrote to memory of 2836 2596 wmisecure64.exe 37 PID 2596 wrote to memory of 1028 2596 wmisecure64.exe 39 PID 2596 wrote to memory of 1028 2596 wmisecure64.exe 39 PID 2596 wrote to memory of 1028 2596 wmisecure64.exe 39 PID 2596 wrote to memory of 1028 2596 wmisecure64.exe 39 PID 2596 wrote to memory of 1652 2596 wmisecure64.exe 41 PID 2596 wrote to memory of 1652 2596 wmisecure64.exe 41 PID 2596 wrote to memory of 1652 2596 wmisecure64.exe 41 PID 2596 wrote to memory of 1652 2596 wmisecure64.exe 41 PID 2596 wrote to memory of 2104 2596 wmisecure64.exe 43 PID 2596 wrote to memory of 2104 2596 wmisecure64.exe 43 PID 2596 wrote to memory of 2104 2596 wmisecure64.exe 43 PID 2596 wrote to memory of 2104 2596 wmisecure64.exe 43 PID 2596 wrote to memory of 2232 2596 wmisecure64.exe 45 PID 2596 wrote to memory of 2232 2596 wmisecure64.exe 45 PID 2596 wrote to memory of 2232 2596 wmisecure64.exe 45 PID 2596 wrote to memory of 2232 2596 wmisecure64.exe 45 PID 2596 wrote to memory of 2120 2596 wmisecure64.exe 47 PID 2596 wrote to memory of 2120 2596 wmisecure64.exe 47 PID 2596 wrote to memory of 2120 2596 wmisecure64.exe 47 PID 2596 wrote to memory of 2120 2596 wmisecure64.exe 47 PID 2596 wrote to memory of 1096 2596 wmisecure64.exe 49 PID 2596 wrote to memory of 1096 2596 wmisecure64.exe 49 PID 2596 wrote to memory of 1096 2596 wmisecure64.exe 49 PID 2596 wrote to memory of 1096 2596 wmisecure64.exe 49 PID 2596 wrote to memory of 1640 2596 wmisecure64.exe 51 PID 2596 wrote to memory of 1640 2596 wmisecure64.exe 51 PID 2596 wrote to memory of 1640 2596 wmisecure64.exe 51 PID 2596 wrote to memory of 1640 2596 wmisecure64.exe 51 PID 2596 wrote to memory of 1616 2596 wmisecure64.exe 53 PID 2596 wrote to memory of 1616 2596 wmisecure64.exe 53 PID 2596 wrote to memory of 1616 2596 wmisecure64.exe 53 PID 2596 wrote to memory of 1616 2596 wmisecure64.exe 53 PID 2596 wrote to memory of 2428 2596 wmisecure64.exe 55 PID 2596 wrote to memory of 2428 2596 wmisecure64.exe 55 PID 2596 wrote to memory of 2428 2596 wmisecure64.exe 55 PID 2596 wrote to memory of 2428 2596 wmisecure64.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe"C:\Users\Admin\AppData\Local\Temp\98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Roaming\Wallpapers.exe"C:\Users\Admin\AppData\Roaming\Wallpapers.exe" C:\Users\Admin\AppData\Local\Temp\98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe" unk3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe" unk24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe" unk35⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe" execute6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe" autorun6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1028
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2104
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1096
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:888
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1996
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD50bd98fd9b22381219d27e25538eecd5c
SHA1e852ab8636f51e30f208480db9e36378f1c01d46
SHA256589bd5bb5a7bf69cc2408158303cd7d0cc09878e2f5088afeeba83e3d761d9c3
SHA5123199396848b98a61e2051576c1aae2e5141c4cf4ca9d21b1f6e0e30b92809507cfcabca8fa9e2274c4ae368cbedb74fe87d393b0e9163867c9a5e03ccffc6854
-
Filesize
262KB
MD5fc227d909016afd06e677400da8531a9
SHA1408f218da4491e64628c73acc12a83128514e3dd
SHA2560867315150c7be1cf3ae0f646691aabb78242a8eb2456e0a705d9e1c5d1d6cc4
SHA512eb6f9e84582b4a3278ab732793bed481c9062e0d60751711e99bca349cc840dd1f9b7ef06d58d032d54f0288cae3833111173e86b9d0215f45ebc85dc4846b4d
-
Filesize
262KB
MD566ad67090325a0f3cdf019c600c08a16
SHA10c28e5c774713357dbc341aa12a383b1e75e4f9c
SHA256fff4bd3b065b01c27d40ce3dc0b745f6da686d8c57725c83417f9335e141d8c8
SHA512ac392a26e8443cb32af93f7ec04a4b74d983895a5aafa3c3f8378cb429397a7008aa0238bb585745cbc4ee819d886ac49d4151c8d977baefe670d5a2bc47fb9a
-
Filesize
262KB
MD549040a443e673dbaf8e5c728b88fce11
SHA1efee6be4b19adad43e5bd470c031c225ef86bcb0
SHA256e62e354e7a8a02793629e6e52e49407485a08794594e9dae78b739f591436018
SHA51264db7a5a18dc866debdab206f94a0457e976d23474e772c8e0d7ed638a889f3d606d16b56a5e4fa3c110f6157f3867c383c8f330aaf62ce5a1b49570831b81fa