Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 06:59
General
-
Target
713e742f7314ca8d684137f996540b4b.exe
-
Size
6.7MB
-
MD5
713e742f7314ca8d684137f996540b4b
-
SHA1
1d88ed5170efab2d32d83341be56e1b9f6720d7c
-
SHA256
41bd2718e24b2367c4a29a6eb94045d4ce1e29b4d6ca99d7d2d8b14e316e18f5
-
SHA512
df373f00d609666811494d31c48f030e15155ddd4c3ccd4f0ef734a0eb4bee074244e8bb73263f06edca3cef60db37f7f603e98b7c040b6741dbcf8270fa90e4
-
SSDEEP
98304:tbqknnTC8vHM8aKN+3v4FOjfU2TNe7vWL26AaNeWgPhlmVqkQ7XSKUR83B:tzO8vH04FmMnG4S03B
Malware Config
Extracted
asyncrat
0.5.8
Default
thing-wine.gl.at.ply.gg:55280
EFhpy3TPM7sR
-
delay
3
-
install
true
-
install_file
Ass.exe
-
install_folder
%Temp%
Extracted
quasar
1.4.1
Office04
businesses-eric.gl.at.ply.gg:55282
ebfbd873-38ee-4f7b-bfe9-2b77cdff1c45
-
encryption_key
361A99FCBAEDCD5C706B5E52C37C90BFB4E13FB2
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
1000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
xworm
projects-pf.gl.at.ply.gg:55284
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x0005000000019aef-41.dat family_xworm behavioral1/memory/2756-50-0x0000000001030000-0x000000000104A000-memory.dmp family_xworm behavioral1/memory/2448-194-0x0000000001250000-0x000000000126A000-memory.dmp family_xworm -
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\RedistList\\taskhost.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\RedistList\\taskhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\taskhost.exe\", \"C:\\Program Files (x86)\\Google\\OSPPSVC.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\RedistList\\taskhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\taskhost.exe\", \"C:\\Program Files (x86)\\Google\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\lsass.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\RedistList\\taskhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\taskhost.exe\", \"C:\\Program Files (x86)\\Google\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\lsass.exe\", \"C:\\ChainPortsessionbroker\\conhost.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\RedistList\\taskhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\taskhost.exe\", \"C:\\Program Files (x86)\\Google\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\lsass.exe\", \"C:\\ChainPortsessionbroker\\conhost.exe\", \"C:\\ChainPortsessionbroker\\WMIADAP.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\RedistList\\taskhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\taskhost.exe\", \"C:\\Program Files (x86)\\Google\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\lsass.exe\", \"C:\\ChainPortsessionbroker\\conhost.exe\", \"C:\\ChainPortsessionbroker\\WMIADAP.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wscript.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\RedistList\\taskhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\taskhost.exe\", \"C:\\Program Files (x86)\\Google\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\lsass.exe\", \"C:\\ChainPortsessionbroker\\conhost.exe\", \"C:\\ChainPortsessionbroker\\WMIADAP.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wscript.exe\", \"C:\\Windows\\Branding\\Basebrd\\en-US\\Client.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\OSPPSVC.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\RedistList\\taskhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\taskhost.exe\", \"C:\\Program Files (x86)\\Google\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\lsass.exe\", \"C:\\ChainPortsessionbroker\\conhost.exe\", \"C:\\ChainPortsessionbroker\\WMIADAP.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wscript.exe\", \"C:\\Windows\\Branding\\Basebrd\\en-US\\Client.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\OSPPSVC.exe\", \"C:\\Program Files\\Windows Mail\\en-US\\wscript.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\RedistList\\taskhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\taskhost.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\RedistList\\taskhost.exe\", \"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\taskhost.exe\", \"C:\\Program Files (x86)\\Google\\OSPPSVC.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\lsass.exe\", \"C:\\ChainPortsessionbroker\\conhost.exe\", \"C:\\ChainPortsessionbroker\\WMIADAP.exe\", \"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wscript.exe\", \"C:\\Windows\\Branding\\Basebrd\\en-US\\Client.exe\"" Fontsession.exe -
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1776 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2504 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1072 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1680 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1452 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1588 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1424 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2732 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1832 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2500 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2616 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1436 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2568 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 912 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1276 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 844 2412 schtasks.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 2412 schtasks.exe 46 -
Quasar payload 4 IoCs
resource yara_rule behavioral1/files/0x000e000000018660-36.dat family_quasar behavioral1/memory/2352-46-0x0000000000400000-0x0000000000AB3000-memory.dmp family_quasar behavioral1/memory/2736-51-0x0000000000E10000-0x0000000001134000-memory.dmp family_quasar behavioral1/memory/1440-103-0x0000000000860000-0x0000000000B84000-memory.dmp family_quasar -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000f000000013423-2.dat family_asyncrat -
resource yara_rule behavioral1/files/0x00080000000174a8-9.dat dcrat behavioral1/memory/2352-46-0x0000000000400000-0x0000000000AB3000-memory.dmp dcrat behavioral1/files/0x000500000001979c-91.dat dcrat behavioral1/memory/2364-94-0x0000000000E20000-0x0000000001072000-memory.dmp dcrat behavioral1/memory/904-176-0x00000000009E0000-0x0000000000C32000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1708 powershell.exe 2076 powershell.exe 1376 powershell.exe -
Disables Task Manager via registry modification
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WizWormStub.lnk WizWormStub.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WizWormStub.lnk WizWormStub.exe -
Executes dropped EXE 13 IoCs
pid Process 2324 AsyncStub.exe 1224 DCRatStub.exe 2216 OrcusStub.exe 2736 QuasarStub.exe 2756 WizWormStub.exe 2584 WindowsInput.exe 2364 Fontsession.exe 1440 Client.exe 2880 AudioDriver.exe 904 lsass.exe 2296 Ass.exe 2448 WizWormStub.exe 880 WizWormStub.exe -
Loads dropped DLL 10 IoCs
pid Process 2352 713e742f7314ca8d684137f996540b4b.exe 2352 713e742f7314ca8d684137f996540b4b.exe 2352 713e742f7314ca8d684137f996540b4b.exe 2352 713e742f7314ca8d684137f996540b4b.exe 2352 713e742f7314ca8d684137f996540b4b.exe 2216 OrcusStub.exe 2764 cmd.exe 2764 cmd.exe 2216 OrcusStub.exe 2708 cmd.exe -
Adds Run key to start application 2 TTPs 25 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client = "\"C:\\Windows\\Branding\\Basebrd\\en-US\\Client.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\Program Files\\Windows Mail\\en-US\\wscript.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\taskhost.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wscript.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client = "\"C:\\Windows\\Branding\\Basebrd\\en-US\\Client.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\RedistList\\taskhost.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\lsass.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Google\\OSPPSVC.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Google\\OSPPSVC.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Windows Media Player\\OSPPSVC.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Program Files (x86)\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\taskhost.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\ChainPortsessionbroker\\WMIADAP.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wscript.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\Program Files\\Windows Mail\\en-US\\wscript.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Recovery\\7da403a2-3a8c-11ef-b191-d685e2345d05\\wininit.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WMIADAP = "\"C:\\ChainPortsessionbroker\\WMIADAP.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\lsass.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\ChainPortsessionbroker\\conhost.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Mozilla Firefox\\uninstall\\csrss.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\RedistList\\taskhost.exe\"" Fontsession.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\ChainPortsessionbroker\\conhost.exe\"" Fontsession.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\WizWormStub = "C:\\ProgramData\\WizWormStub.exe" WizWormStub.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files (x86)\\Windows Media Player\\OSPPSVC.exe\"" Fontsession.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WindowsInput.InstallLog WindowsInput.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created C:\Windows\system32\SubDir\Client.exe QuasarStub.exe File opened for modification C:\Windows\system32\SubDir\Client.exe QuasarStub.exe File opened for modification C:\Windows\system32\SubDir QuasarStub.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir Client.exe File created C:\Windows\SysWOW64\WindowsInput.exe OrcusStub.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Google\OSPPSVC.exe Fontsession.exe File created C:\Program Files (x86)\Google\1610b97d3ab4a7 Fontsession.exe File created C:\Program Files (x86)\Windows Photo Viewer\lsass.exe Fontsession.exe File created C:\Program Files\Windows Mail\en-US\817c8c8ec737a7 Fontsession.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\b75386f1303e64 Fontsession.exe File created C:\Program Files (x86)\Windows Media Player\1610b97d3ab4a7 Fontsession.exe File created C:\Program Files\Windows Mail\en-US\wscript.exe Fontsession.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\b75386f1303e64 Fontsession.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\taskhost.exe Fontsession.exe File created C:\Program Files\Mozilla Firefox\uninstall\csrss.exe Fontsession.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\csrss.exe Fontsession.exe File created C:\Program Files\Mozilla Firefox\uninstall\886983d96e3d3e Fontsession.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\taskhost.exe Fontsession.exe File created C:\Program Files (x86)\Windows Photo Viewer\6203df4a6bafc7 Fontsession.exe File created C:\Program Files (x86)\Windows Media Player\OSPPSVC.exe Fontsession.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Branding\Basebrd\en-US\Client.exe Fontsession.exe File created C:\Windows\Branding\Basebrd\en-US\5e896533852c8e Fontsession.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncStub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AudioDriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 713e742f7314ca8d684137f996540b4b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DCRatStub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OrcusStub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2724 timeout.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2372 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 40 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1776 schtasks.exe 1072 schtasks.exe 1680 schtasks.exe 1588 schtasks.exe 2328 schtasks.exe 2960 schtasks.exe 844 schtasks.exe 1772 schtasks.exe 1452 schtasks.exe 3000 schtasks.exe 1832 schtasks.exe 1976 schtasks.exe 3024 schtasks.exe 2744 schtasks.exe 2500 schtasks.exe 1920 schtasks.exe 2952 schtasks.exe 2816 schtasks.exe 2600 schtasks.exe 1436 schtasks.exe 1276 schtasks.exe 1780 schtasks.exe 2672 schtasks.exe 2504 schtasks.exe 2732 schtasks.exe 2616 schtasks.exe 2568 schtasks.exe 2944 schtasks.exe 2116 schtasks.exe 1684 schtasks.exe 2760 schtasks.exe 2584 schtasks.exe 1424 schtasks.exe 2312 schtasks.exe 2648 schtasks.exe 2920 schtasks.exe 2888 schtasks.exe 2632 schtasks.exe 912 schtasks.exe 1820 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 2364 Fontsession.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 1708 powershell.exe 2076 powershell.exe 2364 Fontsession.exe 2364 Fontsession.exe 2324 AsyncStub.exe 2324 AsyncStub.exe 2324 AsyncStub.exe 1376 powershell.exe 904 lsass.exe 2756 WizWormStub.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe 2880 AudioDriver.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2756 WizWormStub.exe Token: SeDebugPrivilege 2736 QuasarStub.exe Token: SeDebugPrivilege 2364 Fontsession.exe Token: SeDebugPrivilege 1440 Client.exe Token: SeDebugPrivilege 2880 AudioDriver.exe Token: SeDebugPrivilege 1708 powershell.exe Token: SeDebugPrivilege 2076 powershell.exe Token: SeDebugPrivilege 2324 AsyncStub.exe Token: SeDebugPrivilege 1376 powershell.exe Token: SeDebugPrivilege 904 lsass.exe Token: SeDebugPrivilege 2756 WizWormStub.exe Token: SeDebugPrivilege 2296 Ass.exe Token: SeDebugPrivilege 2296 Ass.exe Token: SeDebugPrivilege 2448 WizWormStub.exe Token: SeDebugPrivilege 880 WizWormStub.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1440 Client.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1440 Client.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2880 AudioDriver.exe 1440 Client.exe 2756 WizWormStub.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2324 2352 713e742f7314ca8d684137f996540b4b.exe 31 PID 2352 wrote to memory of 2324 2352 713e742f7314ca8d684137f996540b4b.exe 31 PID 2352 wrote to memory of 2324 2352 713e742f7314ca8d684137f996540b4b.exe 31 PID 2352 wrote to memory of 2324 2352 713e742f7314ca8d684137f996540b4b.exe 31 PID 2352 wrote to memory of 1224 2352 713e742f7314ca8d684137f996540b4b.exe 32 PID 2352 wrote to memory of 1224 2352 713e742f7314ca8d684137f996540b4b.exe 32 PID 2352 wrote to memory of 1224 2352 713e742f7314ca8d684137f996540b4b.exe 32 PID 2352 wrote to memory of 1224 2352 713e742f7314ca8d684137f996540b4b.exe 32 PID 2352 wrote to memory of 2216 2352 713e742f7314ca8d684137f996540b4b.exe 33 PID 2352 wrote to memory of 2216 2352 713e742f7314ca8d684137f996540b4b.exe 33 PID 2352 wrote to memory of 2216 2352 713e742f7314ca8d684137f996540b4b.exe 33 PID 2352 wrote to memory of 2216 2352 713e742f7314ca8d684137f996540b4b.exe 33 PID 1224 wrote to memory of 2740 1224 DCRatStub.exe 34 PID 1224 wrote to memory of 2740 1224 DCRatStub.exe 34 PID 1224 wrote to memory of 2740 1224 DCRatStub.exe 34 PID 1224 wrote to memory of 2740 1224 DCRatStub.exe 34 PID 2352 wrote to memory of 2736 2352 713e742f7314ca8d684137f996540b4b.exe 36 PID 2352 wrote to memory of 2736 2352 713e742f7314ca8d684137f996540b4b.exe 36 PID 2352 wrote to memory of 2736 2352 713e742f7314ca8d684137f996540b4b.exe 36 PID 2352 wrote to memory of 2736 2352 713e742f7314ca8d684137f996540b4b.exe 36 PID 1224 wrote to memory of 2748 1224 DCRatStub.exe 35 PID 1224 wrote to memory of 2748 1224 DCRatStub.exe 35 PID 1224 wrote to memory of 2748 1224 DCRatStub.exe 35 PID 1224 wrote to memory of 2748 1224 DCRatStub.exe 35 PID 2352 wrote to memory of 2756 2352 713e742f7314ca8d684137f996540b4b.exe 37 PID 2352 wrote to memory of 2756 2352 713e742f7314ca8d684137f996540b4b.exe 37 PID 2352 wrote to memory of 2756 2352 713e742f7314ca8d684137f996540b4b.exe 37 PID 2352 wrote to memory of 2756 2352 713e742f7314ca8d684137f996540b4b.exe 37 PID 2216 wrote to memory of 2584 2216 OrcusStub.exe 87 PID 2216 wrote to memory of 2584 2216 OrcusStub.exe 87 PID 2216 wrote to memory of 2584 2216 OrcusStub.exe 87 PID 2216 wrote to memory of 2584 2216 OrcusStub.exe 87 PID 2740 wrote to memory of 2764 2740 WScript.exe 39 PID 2740 wrote to memory of 2764 2740 WScript.exe 39 PID 2740 wrote to memory of 2764 2740 WScript.exe 39 PID 2740 wrote to memory of 2764 2740 WScript.exe 39 PID 2764 wrote to memory of 2364 2764 cmd.exe 41 PID 2764 wrote to memory of 2364 2764 cmd.exe 41 PID 2764 wrote to memory of 2364 2764 cmd.exe 41 PID 2764 wrote to memory of 2364 2764 cmd.exe 41 PID 2736 wrote to memory of 1976 2736 QuasarStub.exe 42 PID 2736 wrote to memory of 1976 2736 QuasarStub.exe 42 PID 2736 wrote to memory of 1976 2736 QuasarStub.exe 42 PID 2736 wrote to memory of 1440 2736 QuasarStub.exe 44 PID 2736 wrote to memory of 1440 2736 QuasarStub.exe 44 PID 2736 wrote to memory of 1440 2736 QuasarStub.exe 44 PID 2216 wrote to memory of 2880 2216 OrcusStub.exe 45 PID 2216 wrote to memory of 2880 2216 OrcusStub.exe 45 PID 2216 wrote to memory of 2880 2216 OrcusStub.exe 45 PID 2216 wrote to memory of 2880 2216 OrcusStub.exe 45 PID 1440 wrote to memory of 1772 1440 Client.exe 47 PID 1440 wrote to memory of 1772 1440 Client.exe 47 PID 1440 wrote to memory of 1772 1440 Client.exe 47 PID 2756 wrote to memory of 1708 2756 WizWormStub.exe 57 PID 2756 wrote to memory of 1708 2756 WizWormStub.exe 57 PID 2756 wrote to memory of 1708 2756 WizWormStub.exe 57 PID 2756 wrote to memory of 2076 2756 WizWormStub.exe 62 PID 2756 wrote to memory of 2076 2756 WizWormStub.exe 62 PID 2756 wrote to memory of 2076 2756 WizWormStub.exe 62 PID 2324 wrote to memory of 2752 2324 AsyncStub.exe 73 PID 2324 wrote to memory of 2752 2324 AsyncStub.exe 73 PID 2324 wrote to memory of 2752 2324 AsyncStub.exe 73 PID 2324 wrote to memory of 2752 2324 AsyncStub.exe 73 PID 2324 wrote to memory of 2708 2324 AsyncStub.exe 75 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\713e742f7314ca8d684137f996540b4b.exe"C:\Users\Admin\AppData\Local\Temp\713e742f7314ca8d684137f996540b4b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\AsyncStub.exe"C:\Users\Admin\AppData\Local\Temp\AsyncStub.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Ass" /tr '"C:\Users\Admin\AppData\Local\Temp\Ass.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Ass" /tr '"C:\Users\Admin\AppData\Local\Temp\Ass.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpEF6E.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\Ass.exe"C:\Users\Admin\AppData\Local\Temp\Ass.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DCRatStub.exe"C:\Users\Admin\AppData\Local\Temp\DCRatStub.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ChainPortsessionbroker\QV4mcYA2Sc8KOpCoQlEXh.vbe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ChainPortsessionbroker\G0RgA51UzNSlvJ.bat" "4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\ChainPortsessionbroker\Fontsession.exe"C:\ChainPortsessionbroker\Fontsession.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2364 -
C:\Program Files (x86)\Windows Photo Viewer\lsass.exe"C:\Program Files (x86)\Windows Photo Viewer\lsass.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2372
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ChainPortsessionbroker\file.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Users\Admin\AppData\Local\Temp\OrcusStub.exe"C:\Users\Admin\AppData\Local\Temp\OrcusStub.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2584
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
-
C:\Users\Admin\AppData\Local\Temp\QuasarStub.exe"C:\Users\Admin\AppData\Local\Temp\QuasarStub.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1976
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\WizWormStub.exe"C:\Users\Admin\AppData\Local\Temp\WizWormStub.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\WizWormStub.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WizWormStub.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\WizWormStub.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WizWormStub" /tr "C:\ProgramData\WizWormStub.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1820
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Mozilla Firefox\uninstall\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\uninstall\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Mozilla Firefox\uninstall\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Recovery\7da403a2-3a8c-11ef-b191-d685e2345d05\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\7da403a2-3a8c-11ef-b191-d685e2345d05\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Recovery\7da403a2-3a8c-11ef-b191-d685e2345d05\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Google\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Photo Viewer\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\ChainPortsessionbroker\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\ChainPortsessionbroker\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\ChainPortsessionbroker\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 13 /tr "'C:\ChainPortsessionbroker\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\ChainPortsessionbroker\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 6 /tr "'C:\ChainPortsessionbroker\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 10 /tr "'C:\Recovery\7da403a2-3a8c-11ef-b191-d685e2345d05\wscript.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscript" /sc ONLOGON /tr "'C:\Recovery\7da403a2-3a8c-11ef-b191-d685e2345d05\wscript.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 9 /tr "'C:\Recovery\7da403a2-3a8c-11ef-b191-d685e2345d05\wscript.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ClientC" /sc MINUTE /mo 8 /tr "'C:\Windows\Branding\Basebrd\en-US\Client.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Client" /sc ONLOGON /tr "'C:\Windows\Branding\Basebrd\en-US\Client.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ClientC" /sc MINUTE /mo 10 /tr "'C:\Windows\Branding\Basebrd\en-US\Client.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Media Player\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Media Player\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Mail\en-US\wscript.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscript" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\en-US\wscript.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Mail\en-US\wscript.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1684
-
C:\Windows\system32\taskeng.exetaskeng.exe {56389878-05C9-4DA9-9A69-7F547A0A5B77} S-1-5-21-3450744190-3404161390-554719085-1000:PDIZKVQX\Admin:Interactive:[1]1⤵PID:2612
-
C:\ProgramData\WizWormStub.exeC:\ProgramData\WizWormStub.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\ProgramData\WizWormStub.exeC:\ProgramData\WizWormStub.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:880
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5e68c730d5e9eea130b20f99f8380e644
SHA1d5387728b7aa9724e5f49d9ebe871c4bcc447c01
SHA25644a30d53788ccbbef510a68b894c40a093ecc4a934b6a7c91037d3180987bf71
SHA5124389361097a762576b0ed8da4ebec4d4189af80decbe0b4e2e7c12a6b2f206107ad0597be557690cac73f0e5875057e48a7338a52403288527329e276cbc6041
-
Filesize
166B
MD5eff3710eb6f094ac204ff6b4d7d7107e
SHA12ec3eebb2037ee862dfd7984101bbec687c7ad7b
SHA2565a27f828660d67faae0e0c7c9d201c543f9e16db4ef1cb5f0883899b86e321d7
SHA51219becb062d3cf759b820fb45170e9aab11e6179475c0090f9306ca2e722f24b74274263fbb4783096ceb10d311dc8f1f3261ef9f44ee0235a70aa0f004cb508c
-
Filesize
224B
MD555733945e00baace8cd6236206f9acf6
SHA161a590cb6acb3e6bfaac1fc5752162fc60647ce5
SHA256d7f4a58ae89de59a45958e9a78eb6d3e83ff45d9843747850fc4f4974f24e3e3
SHA51258ac06c815cc508dc6281cae24a78ac98fce1bd310809f0311a4613adf2f103e92ccd65e073787ef682d9a37adc3ef6fd1c81f7eebdc5f7a0f7b28636caa76c8
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
596B
MD5cb1bafcb3fb3195881c7c67e4261f503
SHA1e7246d89642cd7205a745e55062123dd67a85394
SHA2566440aac0367e1bae8944a650f73ca775ed4a0f3810576adce09d6c4f6d10f6ae
SHA5122da4d8bf1142ccd20fa3190fd7670d67f1b48bfbbfe55a71fc8cb1570cc69f3128892bb2b02309fc0353d0b928168f3810d0b2938bd08f6b01b31910929dacf7
-
Filesize
841KB
MD53de8bb77473e360e1b15d2f80f489248
SHA1507f0223797e077f25775908d911dbbdc64e04a9
SHA256be6c566ca9e0f0c620ccbd0581b48ba0cdf616135195dc4f5b9236f985b3172f
SHA5124addcce355f43e392b30b78195372ae8618fdf42f976a6bc88c369708efa3ce2c1222f7f1e20cc49491cc475c970c687445062c51c026d0bf7ecdea3fb26017c
-
Filesize
150B
MD5105e15e9f9218f8dd3de02cff29cb44e
SHA11695cf1ffde4da9356748046f1270b1c2cd44543
SHA256f6a7c4f218faaa9add00a01cf07ce1c22138f9a5c459fd8579bf11fb9b837794
SHA5123d574aecad5a78b25e118f6cacc66e6d42cbdc599be5ab9d1fc235b71c1dfe796a6b6213be3145d1b4227d2741f1e0083abeb24606341e750725dbb8a8eca74d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD55e6b4ac3280c815811d2b44d8d5ffd8e
SHA149354e4f5330d29d188c96cf1c662cd13bfab6cb
SHA256dc4ae0ec682871e953c392d36b0a85cbb9d646d1a47a0e388d3e0bb167530d8a
SHA512435c49e285527bcdc14676d989bf1e71d4b69d9348a020cf74c4bbb788e8e4a038c9a793782e3265cc1f26d79ad8fb3ef1bad8b712f44ff9a247f35bdc5f8bb2
-
Filesize
224B
MD5e469dda91ae810a1f94c96060f3f8a65
SHA10b4b3b0f6f937016b1e045ce5313ee2a65a38630
SHA256d42fee8db8eb0e047ca53ad59b1c9bc69fe04993be36fec502e3532371908842
SHA5122eb4037361c03e195c642a53f55a3182a6df19903db503060e366f2394750e64ae04fdaace61ef5a6dba649defc88322d78edd2928bc53ebd1ce11d68cc88dac
-
Filesize
597B
MD5c2291863df7c2d3038ce3c22fa276506
SHA17b7d2bc07a6c35523807342c747c9b6a19f3184e
SHA25614504199bede3f46129969dbd2b7680f2e5b7fcd73a3e427ce1bb6217a6d13da
SHA51200bf40174a67e3e663d18a887c5b461a1e5ead0b27f0a139d87969158c58f4ca72cfa5a731dda239356192ca4cb5ac6ae2b0e37401d534e686cabacd3cbee8fa
-
Filesize
21KB
MD5e854a4636afc652b320e12e50ba4080e
SHA18a4ac6ecc22ee5f3a8ec846d38b41ff18c641fdc
SHA25694b9c78c6fa2bf61fba20a08ad4563f7dd2f5668c28eff227965ce0a2032d5d5
SHA51230aabd5079b6ed0948eb70fd18e9166096e4ba5d1d47fc35b7270f931d19bbe6cd929b6010f70297bf5272dc5a79e2523721354d211c4080d68ad8d17e316118
-
Filesize
47KB
MD52498d43b33fdf705d23a044d0704271b
SHA179b2ee6e706d561533936cde87a46830fbfeec9b
SHA256d1ba8885bb27b8b53e8754181b474f47d0afc57ce406ca4c18edf111cbb63226
SHA51279b0ff8be1762e31c20ae5b5440958bbe652b11f219a5542d9cd2fa789c90dd5898b14be2245ae03f49c5ada54db0547df5eacc7d143f9c0ea608fb4600b4690
-
Filesize
2.6MB
MD59d479998ab307798514e77b13fa5a38a
SHA12cdd52a5496e45d74a8acce3b19456ef5241130b
SHA256b83e03ed28f61bcfa07e3a06b73d7e0a3b6e8469fe8d8137549cc12ae3911b08
SHA512122bf95d3e56c366db4e1a1af4c2c44d980a54a7a2dca3ef7376587d8e5bcf32d0e06b2bf6465f164763c5f8954302704ead062a9de0729aa4e6e6161051a6f4
-
Filesize
3.1MB
MD56940c38a8661b0b8713afd4c63b12456
SHA1cc78ac6b4974bb3352890b8e89d038ddc4c4eae4
SHA25642a913fedb31db5ba0cf28abd0fe6afc3b9807aac7045a1c02579c2b3282a3b1
SHA512df2e75e842f22802a43e155c0667147933d17f8902df880d3738d29a5bcaae5ae199c759642bf2414c10a1eca4721966b3d7759e06ddeca5b69c698689e71b05
-
Filesize
81KB
MD5cdff2cee70c00c73f066e1c9a7515a95
SHA1f8bfe41193a917830dc13450c2665d862fea08d1
SHA256f52798a690f661a2b30e2fb3a3689a0aa09fcc0f7ea4efe669e265670742254e
SHA512747a63e7bc184d7fd09f842c176090bc37c88166155b4429faf430760cd8af182c853cc173c62a25ce3c94ccd74b66106b145f80bf5bb151e6b9bb865f23a939