Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe
Resource
win10v2004-20240802-en
General
-
Target
e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe
-
Size
1.8MB
-
MD5
306c2d16a6c39850c1a960ecd5fd2e60
-
SHA1
9ad230d95a9ae4c42cc800e710fd0d6dc0abc208
-
SHA256
e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066
-
SHA512
458c70d255edae4928bb0c7773a63e647375cbcfb3e8cd058013aa59d0ca2b5db16a9a064aab30f948b24e6426a49dd20e0c6add6d6492382a41d35ff6a5bc58
-
SSDEEP
49152:jbLKdkfIKSF6L1yEcTad4UNNnm6pGz8YGzw:jb0aLcad4q/Gz8b
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Documents\\explorer.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Documents\\explorer.exe\", \"C:\\Windows\\RemotePackages\\audiodg.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Documents\\explorer.exe\", \"C:\\Windows\\RemotePackages\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\System.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Documents\\explorer.exe\", \"C:\\Windows\\RemotePackages\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Windows\\Offline Web Pages\\spoolsv.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Documents\\explorer.exe\", \"C:\\Windows\\RemotePackages\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Windows\\Offline Web Pages\\spoolsv.exe\", \"C:\\Users\\All Users\\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Documents\\explorer.exe\", \"C:\\Windows\\RemotePackages\\audiodg.exe\", \"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\System.exe\", \"C:\\Windows\\Offline Web Pages\\spoolsv.exe\", \"C:\\Users\\All Users\\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2548 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1576 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 916 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1500 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1784 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2928 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 600 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2336 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1532 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1464 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 2568 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 532 2568 schtasks.exe 30 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\System.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\MSOCache\\All Users\\{90140000-00BA-0409-0000-0000000FF1CE}-C\\System.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\Offline Web Pages\\spoolsv.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N = "\"C:\\Users\\All Users\\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Windows\\RemotePackages\\audiodg.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Users\\All Users\\Documents\\explorer.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Windows\\RemotePackages\\audiodg.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\Offline Web Pages\\spoolsv.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N = "\"C:\\Users\\All Users\\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Users\\All Users\\Documents\\explorer.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 5 ipinfo.io -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCB74EE3F736364759A3B8EEE04376DE5.TMP csc.exe File created \??\c:\Windows\System32\8wawgv.exe csc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Offline Web Pages\f3b6ecef712a24 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe File created C:\Windows\RemotePackages\audiodg.exe e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe File created C:\Windows\RemotePackages\42af1c969fbb7b e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe File created C:\Windows\Offline Web Pages\spoolsv.exe e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2224 PING.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2224 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2928 schtasks.exe 2336 schtasks.exe 2548 schtasks.exe 2816 schtasks.exe 1784 schtasks.exe 1532 schtasks.exe 1464 schtasks.exe 2660 schtasks.exe 2888 schtasks.exe 2940 schtasks.exe 2620 schtasks.exe 916 schtasks.exe 2780 schtasks.exe 600 schtasks.exe 2344 schtasks.exe 532 schtasks.exe 1576 schtasks.exe 1500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Token: SeDebugPrivilege 1864 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3048 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 34 PID 2212 wrote to memory of 3048 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 34 PID 2212 wrote to memory of 3048 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 34 PID 3048 wrote to memory of 1260 3048 csc.exe 36 PID 3048 wrote to memory of 1260 3048 csc.exe 36 PID 3048 wrote to memory of 1260 3048 csc.exe 36 PID 2212 wrote to memory of 1936 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 52 PID 2212 wrote to memory of 1936 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 52 PID 2212 wrote to memory of 1936 2212 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 52 PID 1936 wrote to memory of 2384 1936 cmd.exe 54 PID 1936 wrote to memory of 2384 1936 cmd.exe 54 PID 1936 wrote to memory of 2384 1936 cmd.exe 54 PID 1936 wrote to memory of 2224 1936 cmd.exe 55 PID 1936 wrote to memory of 2224 1936 cmd.exe 55 PID 1936 wrote to memory of 2224 1936 cmd.exe 55 PID 1936 wrote to memory of 1864 1936 cmd.exe 56 PID 1936 wrote to memory of 1864 1936 cmd.exe 56 PID 1936 wrote to memory of 1864 1936 cmd.exe 56 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe"C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fj54hoyo\fj54hoyo.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2AA9.tmp" "c:\Windows\System32\CSCB74EE3F736364759A3B8EEE04376DE5.TMP"3⤵PID:1260
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NsSkgSAIjN.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2384
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe"C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Documents\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2660
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\All Users\Documents\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Documents\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Windows\RemotePackages\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\RemotePackages\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Windows\RemotePackages\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Windows\Offline Web Pages\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Offline Web Pages\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Windows\Offline Web Pages\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066Ne" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N" /sc ONLOGON /tr "'C:\Users\All Users\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066Ne" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066Ne" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066Ne" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:532
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231B
MD52a83eb3c4d971fa9aa46734ea7fea27e
SHA15513e6929e845f783951db8b58a438559283ae22
SHA2562baea4437908f500387b6a50fb601740495f4ec3b4301978d86eb2c4ea05e21a
SHA512f0f79a13ee3f8564b900eb7576886f05907642ec3c0923adea53f0c17c31cfd06fc2f1d9cf2ea36b27613351b382a73e38f101878ad13594552c5860dc596aaa
-
Filesize
1KB
MD5f386a762a332c6785583783083a3f637
SHA1c24f52bb296129b9f7934b33a427a42561250cf2
SHA2566ff98a1879070a8eb945fce6da63398fbc08308824960c920596af6be8b6a782
SHA512677f5c17d532aa50f27510bb4adbf01ca98da93781d5e5b8092b44c56ef3d7a6fb5e55e7168c2a36a24ed16dcc7bdb94c5a694aedc08b6c4744d91b7ff568a39
-
Filesize
1.8MB
MD5306c2d16a6c39850c1a960ecd5fd2e60
SHA19ad230d95a9ae4c42cc800e710fd0d6dc0abc208
SHA256e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066
SHA512458c70d255edae4928bb0c7773a63e647375cbcfb3e8cd058013aa59d0ca2b5db16a9a064aab30f948b24e6426a49dd20e0c6add6d6492382a41d35ff6a5bc58
-
Filesize
373B
MD529a90b74742e0846ae62fa1295b96739
SHA16b378419b51e42fcef7426e9e03d14c953c1bf74
SHA256bb7e538c1adb21b6768f738da28a364355250dfd220f706feccd8f739bec41c6
SHA512719db194683f7e566b1b74d182665508e9fbd1d962c42f1e7fe5d8e47268b9b9cccb5c3c28a4fc728b3ddb6976c48d1041de2b1d2ce6ee67ad448fb9dbf326ee
-
Filesize
235B
MD580f123d5f6c4037afb4c1b7507a8d228
SHA12c7bb0cda4737adf4697017931f05cabd536d1e9
SHA256105f6c57c3951e34345292ca70add36dcdc76120b7d1bae1d8260389ca0498b3
SHA51242ffec3aeadab3b912f1ff6dcf0f305ab45548b23265fe4b0545f0cc0add77676fe8ed52a97fe2d7bf58ccec262e97ac06bf0334d06685729d619f1cf4d96835
-
Filesize
1KB
MD5028d4cd290ab6fe13d6fecce144a32cc
SHA1e1d9531cb2e6bc9cab285b1f19e5d627257a3394
SHA2563f42f68eb3df49cf836fbb0019b8206af735e22f3d528e7b122fa9b2541fdde3
SHA5122f99d37a56444831298f8efaef425e5dadec938ac459bfc0cdaf3708ef8662f12bd8d687a58fc1dd6bbdac6c806214b65a21489a24d3160c1e8575968e3caa6e