Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe
Resource
win7-20240729-en
General
-
Target
f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe
-
Size
6.8MB
-
MD5
693a774581a901c2a7a719ca8674522b
-
SHA1
37391eea42b849d72b81c825107bc6899529ee03
-
SHA256
f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1
-
SHA512
70ddb46136df175d2e635ac822dc835935e2e6a829f9711a765c105746a30600b607823defb30e41d016cd6689461f872a5d76dde09f0b247046fcd7b266d0ff
-
SSDEEP
98304:QIya2IyauIyauIyauIykMwWQtZ/K0tGOFWVRuLftCT+n:AVxxxFwWyZ/K0ttYVAAT+n
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Executes dropped EXE 3 IoCs
pid Process 2708 UpdatAuto.exe 2716 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1~4.exe 1440 Process not Found -
Loads dropped DLL 6 IoCs
pid Process 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 2708 UpdatAuto.exe 2708 UpdatAuto.exe 2708 UpdatAuto.exe 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Windows\SysWOW64\UpdatAuto.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Windows\SysWOW64\Option.bat UpdatAuto.exe File opened for modification C:\Windows\SysWOW64\UpdatAuto.exe UpdatAuto.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe UpdatAuto.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe UpdatAuto.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe UpdatAuto.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe UpdatAuto.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1680 sc.exe 2460 sc.exe 1736 sc.exe 1468 sc.exe 2088 sc.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpdatAuto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 2708 UpdatAuto.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 30 PID 2244 wrote to memory of 2408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 30 PID 2244 wrote to memory of 2408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 30 PID 2244 wrote to memory of 2408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 30 PID 2244 wrote to memory of 2408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 30 PID 2244 wrote to memory of 2408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 30 PID 2244 wrote to memory of 2408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 30 PID 2244 wrote to memory of 2708 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 32 PID 2244 wrote to memory of 2708 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 32 PID 2244 wrote to memory of 2708 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 32 PID 2244 wrote to memory of 2708 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 32 PID 2244 wrote to memory of 2708 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 32 PID 2244 wrote to memory of 2708 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 32 PID 2244 wrote to memory of 2708 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 32 PID 2708 wrote to memory of 2724 2708 UpdatAuto.exe 33 PID 2708 wrote to memory of 2724 2708 UpdatAuto.exe 33 PID 2708 wrote to memory of 2724 2708 UpdatAuto.exe 33 PID 2708 wrote to memory of 2724 2708 UpdatAuto.exe 33 PID 2708 wrote to memory of 2724 2708 UpdatAuto.exe 33 PID 2708 wrote to memory of 2724 2708 UpdatAuto.exe 33 PID 2708 wrote to memory of 2724 2708 UpdatAuto.exe 33 PID 2244 wrote to memory of 2716 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 35 PID 2244 wrote to memory of 2716 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 35 PID 2244 wrote to memory of 2716 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 35 PID 2244 wrote to memory of 2716 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 35 PID 2244 wrote to memory of 1144 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 36 PID 2244 wrote to memory of 1144 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 36 PID 2244 wrote to memory of 1144 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 36 PID 2244 wrote to memory of 1144 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 36 PID 2244 wrote to memory of 1144 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 36 PID 2244 wrote to memory of 1144 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 36 PID 2244 wrote to memory of 1144 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 36 PID 2244 wrote to memory of 2160 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 37 PID 2244 wrote to memory of 2160 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 37 PID 2244 wrote to memory of 2160 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 37 PID 2244 wrote to memory of 2160 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 37 PID 2244 wrote to memory of 2160 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 37 PID 2244 wrote to memory of 2160 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 37 PID 2244 wrote to memory of 2160 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 37 PID 2244 wrote to memory of 2092 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 39 PID 2244 wrote to memory of 2092 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 39 PID 2244 wrote to memory of 2092 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 39 PID 2244 wrote to memory of 2092 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 39 PID 2244 wrote to memory of 2092 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 39 PID 2244 wrote to memory of 2092 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 39 PID 2244 wrote to memory of 2092 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 39 PID 2244 wrote to memory of 1356 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 40 PID 2244 wrote to memory of 1356 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 40 PID 2244 wrote to memory of 1356 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 40 PID 2244 wrote to memory of 1356 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 40 PID 2244 wrote to memory of 1356 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 40 PID 2244 wrote to memory of 1356 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 40 PID 2244 wrote to memory of 1356 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 40 PID 2244 wrote to memory of 408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 43 PID 2244 wrote to memory of 408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 43 PID 2244 wrote to memory of 408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 43 PID 2244 wrote to memory of 408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 43 PID 2244 wrote to memory of 408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 43 PID 2244 wrote to memory of 408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 43 PID 2244 wrote to memory of 408 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 43 PID 2244 wrote to memory of 2816 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 45 PID 2244 wrote to memory of 2816 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 45 PID 2244 wrote to memory of 2816 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 45 PID 2244 wrote to memory of 2816 2244 f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe"C:\Users\Admin\AppData\Local\Temp\f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat2⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Windows\SysWOW64\UpdatAuto.exeC:\Windows\system32\UpdatAuto.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat3⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
C:\Users\Admin\AppData\Local\Temp\f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1~4.exef4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1~4.exe2⤵
- Executes dropped EXE
PID:2716
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop sharedaccess2⤵
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop wscsvc2⤵
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop srservice2⤵
- System Location Discovery: System Language Discovery
PID:1356 -
C:\Windows\SysWOW64\net.exenet stop srservice3⤵
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice4⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net start TlntSvr2⤵
- System Location Discovery: System Language Discovery
PID:408 -
C:\Windows\SysWOW64\net.exenet start TlntSvr3⤵
- System Location Discovery: System Language Discovery
PID:1232 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TlntSvr4⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net user helpassistant 1234562⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\net.exenet user helpassistant 1234563⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user helpassistant 1234564⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net localgroup administrators helpassistant /add2⤵
- System Location Discovery: System Language Discovery
PID:1420 -
C:\Windows\SysWOW64\net.exenet localgroup administrators helpassistant /add3⤵
- System Location Discovery: System Language Discovery
PID:752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators helpassistant /add4⤵
- System Location Discovery: System Language Discovery
PID:1456
-
-
-
-
C:\Windows\SysWOW64\sc.exesc config srservice start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2460
-
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1736
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1468
-
-
C:\Windows\SysWOW64\sc.exesc config srservice start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD5bbbaf5c09083713eb938eedd25d57caf
SHA1cbf6f90a0c7d10bda24d189e77c55a0ad9254b77
SHA2566833be92406926821897e4d1e97623765887e02166e38016144c67078241bb51
SHA512db8c60f8e45677e4c389abb828d51dbd79551fe1f84891026271fbfb9f8f5d3f59ab306028f77a824987001ff0673574ccaeb3a9b5a9db339318d3310e1880a2
-
Filesize
7.8MB
MD5b4033154ee07d184bed36dd7e110e657
SHA1355b05cdd9fa07995d239e5882c91b21a4e6efa2
SHA256353372866c2f122772cfaa66faff27e7f5aa34f73de66e7b965d136a1884dd1f
SHA512854926c59fdae8906f682cad55bad2961e38956a7d92e2b9364731651134df2fd4672b4c2e56ac7c86e602534279a6804ef08e192a78e7e32a52b68879482614
-
Filesize
7.5MB
MD5df827f1fcfc570acb3890ab904c2a71e
SHA170c5a970bfb872ab07d5fe85e44eea9aae33d98d
SHA2563e03567294d08a8945b1377b6ee6f3cddae7bf63d4bd4ffbfc5f941dfd2c0224
SHA512e5e017400174c01eb5e74a5a723aedf4f0d7bafcee771f0046dd1bb988b973416f6c6944c8a248690036d0b3e059ceb82787e16005b8364d29922e043e32af4d
-
Filesize
7.2MB
MD5525d6b8e4db887b5f948fbac8b25af25
SHA1fe33765dc319202fcb9e70a58b90337e0c4d34cb
SHA2560bf7250fb2db04f0d6799ec13e5af252c05cd99fe4d27b9ad8bd884f23091b59
SHA512b339060e7db979966c2b132aa149352cf0993356266b3a1a320b483d411468f0dddb4007d49dac6a3be0aeaad2c38cca254c8c5e6fc5a5ad22167ad7053f07ef
-
Filesize
7.3MB
MD58067f0eec158f6a3e9c08180e4440e6a
SHA15127ac68060998581cced6a863abdc625dfcbadc
SHA256abdbeae22303aa1b93121aa583c0b39751a842f183542f814e73bb3fc616a204
SHA5129a573fec43caea3b36a6e3b8978d9fbc235ea753726b2794be8e44d53f05cb69b7db6fbfb99144c009169230a8b36cd9fd2c201d002733389f092026b41ada73
-
Filesize
7.6MB
MD5c4b5320708363db280b2003633cbd838
SHA14ea57972069e1f6828e72faf3772eab73634988f
SHA25609fc43af65a0d98cbcddd3a9ca518199d0efa17c141c121de77348c323e9dcbf
SHA5122aa0cf42070bb1f9c411f8989810e040038615f885b27e600fb1c300543e65f8e21ff3d875d26d9e929fc5c4794089ddc5c1890ed4f141da33c215b7cea9bd30
-
Filesize
7.4MB
MD5540e43004905a164068ea005d8f895cc
SHA151bb5980f86beee98ca3c72b46a7b71796707213
SHA256a6d2bf1c5d00bf8b30a017b75169a668b674d1c5aac0a953e1067afe414b938a
SHA512019b184564821dca75c263dc29266fb7e75ee4c4bfc2087f9cceab51724d7568639a10aaae1c4a8334bf4e0ed6e1b870c1a2a47023af0d16eab8fec64fe36c23
-
Filesize
6.7MB
MD52b414dd33883cf7d4c9b1911d0e21777
SHA1fdca58309521506c99ea7e15d15caaab8f512a60
SHA256e3ce6a916440cdadc3cdaf01a89f8d98066190c37900fcf60d38bab6bfa9c8b2
SHA512e7294d2f4dc5da5dda81a8d02bcf76f40009df1f2c64f3e6dfc071f6b250af3160a58335a10a83d53464c62f34f86a6feaac76cbebc37f501940497300d35f14
-
Filesize
11.0MB
MD59c27d0f19b004e023e6c516b5a8e0e5c
SHA154ad69ccb31d7c778eaec30c23723f8e85260b12
SHA2568b7106816bbce999629ea8c3723fcf45dfd089cf0f3ff98e2de79b4ed7fe9d08
SHA5128e3e921c02318e6bd0e1ec4bc9442ecca705e1e5ecd50ff07d72583667b3775a325c5d1258ede19b5ed99ab39be78a70c3d69a45cd6ce95dfae75ede4e95c483
-
Filesize
11.0MB
MD5ddfcde100ce3a9fc4b8a930f1e19a3b1
SHA13b9905a5bf40e22bf990c0266f3a4201ef3876d0
SHA2565c2533a14f66b0976de7a0c644407ad768b1d414845d82e52ba59467607affd0
SHA5120a941349da59f26bde0b394709aeeaf8c72f86d4e0f77aa5c5d9a2879eef240dc4afd8213c67b0242f9b0375c8415ae683b72bd85847678c1d90277ba56055f8
-
Filesize
8.4MB
MD5a0e78119769c5e54fba7743f8c540423
SHA1579b101365836a956cf8e9353bb58cae07227437
SHA25651d3fd3713e5e4871b3dd718a92cd3ccb802c9bd9c2fbf98f1a41ff51f366383
SHA512bf0014fc0baed1f451b194146165af58028936bab2f5a1f11a58c49ff105df0a51b6fcbc6eb57f73ffeda27ea0b420e7d44db92f5e13e145a65c68673d36c3e5
-
Filesize
8.3MB
MD564ba14a3996081a225d530354448c5c2
SHA124d1bae5599879eef41b20993e09848b59b5c8f4
SHA25684f4457bb652fb6d13cbf4ed9d6d65aa68a05fa231e9da960704513ddcbc03ca
SHA512f45e9fc0af90a97fcb32271ca705205b69dba67daa205cc355e0e234c1e6d20848a9a998593f87758c765ee6b6ff0a6922eae575a4152ca6634711b137d40b30
-
Filesize
7.9MB
MD50f74d78dcecd482146f3a19efd5f09f5
SHA129b4d911186c109f4f98f5c8937bb7b8e81268fd
SHA256e271ea160e2132a8a43c8563806075cc4be2d75e58dc264e60c5020d476b0bbe
SHA512f9dd7b1cd29b4bcc3dd0cf6e28c7e5ae6ff1e822f188f4e6039822bb0a44ae57c43f041c75eda2113353f1875446e5bc9b55e360e366c4867836663ba6c0ff3a
-
Filesize
9.5MB
MD56d40f82f8466af6f862ae5e807f7c87f
SHA1a1f43f038ee3c3fcebd2529e9b78ae785a00c233
SHA256926cfb713356ddb2edf1222cf1217de41ecb685d0e1e7b2d31452153d23e244a
SHA512e0c4c080b76e995795b9b132dd5089b10364e8109e035bfe8d5f7511f2e79331ee0a90385205d53ad36521e47fe8cb25d277c826f10767a50c7b8975f161a4ac
-
Filesize
7.7MB
MD5214153845b24bbc140a630483f7f6322
SHA146e9bb36eea220e42dd729c41642cbc23018285e
SHA256fcdc80125164f75d836ca7646bfc6582084d5df4cd0ca8d51cd59c3ebfb7476b
SHA5126df802dfc3212a8e389089ef0434d83c477c823338bd8ac7f820e41c766f8aae6d13193609cdd9664f163a9d470f3238b25e242cd79e1a7e027a40984c081ebd
-
Filesize
6.7MB
MD5cd21ead5e6d75ef851403f0a2b35243e
SHA10fb8d8a8b78a04b20f0b00a4417cfb5fefc95569
SHA256e0b714a4f87e9991e9c3f1c950a9a665d62809bee50824102e6d2d5d55439e60
SHA51201e046b45c2e4e03bb0ac990ee9ebfab555dc4e03fe0db232151fa3c9d246b406f240a44ee05753dd53f652cbb4cbd453de7c6cb92422989e749af14c969af36
-
Filesize
6.7MB
MD555f22f9b9778b61fce939a20d3e21c74
SHA136a08dbde92f1b573fe9c7c6433909592d82cf55
SHA256ab421d8cdd46683a6f08194ee920a6aba42308337a1dcf0883c097837d05fb22
SHA5125e87b036c74739de467e16e5a8e43445991a0a14f60c10a048a0cbd45d8a4e4798ff952cb2dbfa0186021cdcf7bf2230452ac1f3a826c1e6d54b395ae676b4b4
-
Filesize
53B
MD51d04abf39e9df55eed1d04430cc21eb8
SHA1b8292861dfd4e046eb9625e1571cc08c26094d41
SHA2560bc485263cf8a962e64db0b88f156f2a9af1b81ecfdb1cf9111d497e85df70f3
SHA512a2cccc03dadecf6a298b274a6735675aeec1cc280f84432498e9df31aa4a543d2557a2fd06bac4fc8778a774b30bbd31f91c1d0d3ace480b6217654c8d63a7d0
-
Filesize
6.7MB
MD5e22638cbfd5bb4a4e2ef2e4ba35adfa4
SHA111cd29b45b3049886e3b6d8827539561245ce04a
SHA256cc182e9073cd33c71c1c181ddcb26bc42b5bf1388b17a46be3c39c122c1b63c9
SHA51234d3fc7063d56655f806da1dd95bc200a50c61200bc22471dcf16df8aac0f7a54c93afbd919bfc0f56a6b6665f68d7efeb1bf59d7320465148111fdb793000f3
-
Filesize
6.7MB
MD539060c7911980f3dead0fbe702a471f1
SHA1d320c105629bd7da628b162db87812549ee0e5f5
SHA2567b7d04b371da3582d09cd9ca6a410046d0d5ec3f65fbb794b1e3013661817422
SHA512149bedee9085a15a1f98e14518f24a1c9344d4a828ff2bbb8a0afa7b84762e19c82da76e1bdf968abbd2c32ffcc501bc7091cec7f77fba86d517cb93b93995e0
-
Filesize
6.7MB
MD5d8a472d0d7938ce2a2b13b69033e8ee8
SHA1bf46ce90fc9de59d32b9b0b1e73a9a45ad503b50
SHA256e9bfc162a4eec473addaeb01b1f26af1c785694abd629b9a852e0e2291d363fa
SHA5123db7f7d29024067e881bca5802f10164f93a1f48a49a18058e893919c3445ed503c487778682a0cbb7e4f6ed2a80513f6861642df225af067c8041c030d228d3
-
Filesize
6.7MB
MD5a605ac67fb9b80b0da9c0b9750bb9819
SHA18b17d7a9067f2d461d5bee8f1e378077283acd34
SHA25624d78a708c728b05e06c987d85617dc9a9f378731eb46575ae738e6b3bc46d29
SHA512a80a7f49707433a79b951aa3a596ff450c6d9bf304b39765685eaa6c197a9cadc8d57a3c869ffe09293fa6084c1f7fb64da0ebaf631244f96a0f5f202474002c
-
Filesize
6.7MB
MD5b9dc55d14d560e9fa4438f8354d4d174
SHA1cbcb8542e229b25da66c283dcfc136d185d0da46
SHA256a911ffb871374a164376d37de63349d6a9cd6b0e8a8c8eaa4c9acf3124ce6eec
SHA512b253bdfb17ef64874d18c86dd576e051360e59f115b96febc207e4893629c8fdb824faa533d9f3fbc955ce246de514d623001f156ace32f2c39fe9bf6676a3bb
-
Filesize
6.7MB
MD51e4f5a7457552c44502ff22db67f01a2
SHA1e0f743d0124a2ec632f98bfede807c8cdce2775b
SHA256642aa0cf32915a6fbe9218ba112872bb3aa0bb16f74ea9852e65f10e28f3322c
SHA51289a258053eacb52b502547c8b9027f385a5f90cf1b57e2b65877724c506a66468a5631940b32a1d8860ac35b42b7217049711e47e77c1f9282eae2c31421b93d
-
Filesize
6.7MB
MD5279180852ad9e365682dbf359c381fd8
SHA14797f3e03b75267565c7c6b36eb8787a46f3600a
SHA256399d86da8980628850d1c07819725bc3a229347900789f153c8a0e7efe0ed6cf
SHA51210451a5c67e617c56934be19a32bd93d0ff8c3c6057f6a3bf92dcf85d5b03c7b478233f87270a13b1e061b3ea7cf6e8f324f725ab50ab0987b071a09717757e3
-
Filesize
6.7MB
MD5d2231b3ca5cbda15fba9e60dfd5c3425
SHA1fdcd066190b1cc522c9b85129a6ecad338ab97f8
SHA25697e82bbdd981a0f5e086e3434c68b40714bb5e02f6694be40a53e2772517f09d
SHA512868c497276b9bba55223995a7f2667d55b2f3fa72da19087f4ba1143519f29464e65e220808863b4cd395eeb2760887c7c5d48e2de01beb72845bb66e413216f
-
Filesize
6.7MB
MD511893e12c4769be033ce6275d03875bb
SHA16399c0b83c59a841e22594ab27177d1e2d87ef45
SHA2563220ba4294ed4502433e9adb8edbb043d9cd3a5d7a2c49106f0e213c5cbc202a
SHA512d697d5fb5608105101e658fe202225f82f319ca278518f194dd6dbaf8a975b14c88c27b001a32acd36706ad9d4ec1ae5ff5d169025a69844f98f0c4123c5d911
-
Filesize
6.7MB
MD529cdbbf019fab23e69f0ad04306af462
SHA10f03ad7840747a281641f4a722b34e25274ee688
SHA256d12a721adf1f95773e85393957706dd3f9663960db5cdccf67a5a5ca48534a6b
SHA5120ce1b1522a7ebbc23aaa4f42daa3388f722aa1ca42ce8ea708d1153673c133bd7887c489706cf9f297af2c7aad3a8c1243c75dfc82ce180068911bc4fd4ebae2
-
Filesize
6.7MB
MD5a3453968866c22572b9e22879e3ee8c2
SHA1650966609afbe1c97239103951cd7739171f699f
SHA256a96c1668d36c373091f2399d009f856f4f0f23e0c7684e546cace374b0301039
SHA5125b6b38916d070f40d01f04660c3add4054142e460944a8564b8f3b4b6a0494b4e1fc7ff4b178dd62c5435466516713ac8d557b934b1bb09edd61c7fd5f3baa26
-
\Users\Admin\AppData\Local\Temp\f4f8d3c3b8bd227adee9268feaf8566813c9bc4e9d65910064667d1952444cd1~4.exe
Filesize63KB
MD5e3c3615a1e91b534f91804e66e21c45c
SHA18eed287882744cf148c0fc820a9a4e3fc752fd84
SHA25668c2711a671d0d21fe92cc3f0b28b818e18176d100d956c6e2a91e422c0eec98
SHA51219db66f196c5fade72a51258545e3f1a736c4d874a099f10ac79788d55fdffffc2943c21c51ae839b0a7980e40c20c434254768f48b3fc847398faa926bd35b1
-
Filesize
6.7MB
MD5e481c1d899bc0577130ff95ace48f6dc
SHA15cf959159ba7ab107d19ae6c7bc76e390f8819f5
SHA25692576bc27e6747939e049fabe940894ab37260fc7ef0bf4da9240d859180a28a
SHA51275cd1ee9dd276c274aa7d38cc544d9451f06e97c03d324993bbceced2f74f856ebaa86bbb4d2c42534e084f6b065b6b383e3f36fbfd8bc8c5dc4704f65f12063