Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe
Resource
win10v2004-20240802-en
General
-
Target
e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe
-
Size
1.8MB
-
MD5
306c2d16a6c39850c1a960ecd5fd2e60
-
SHA1
9ad230d95a9ae4c42cc800e710fd0d6dc0abc208
-
SHA256
e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066
-
SHA512
458c70d255edae4928bb0c7773a63e647375cbcfb3e8cd058013aa59d0ca2b5db16a9a064aab30f948b24e6426a49dd20e0c6add6d6492382a41d35ff6a5bc58
-
SSDEEP
49152:jbLKdkfIKSF6L1yEcTad4UNNnm6pGz8YGzw:jb0aLcad4q/Gz8b
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Speech\\Idle.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Speech\\Idle.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\csrss.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Speech\\Idle.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\csrss.exe\", \"C:\\Windows\\Help\\en-US\\SearchApp.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Speech\\Idle.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\csrss.exe\", \"C:\\Windows\\Help\\en-US\\SearchApp.exe\", \"C:\\Windows\\Globalization\\RuntimeBroker.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Speech\\Idle.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\csrss.exe\", \"C:\\Windows\\Help\\en-US\\SearchApp.exe\", \"C:\\Windows\\Globalization\\RuntimeBroker.exe\", \"C:\\Users\\All Users\\Oracle\\Java\\.oracle_jre_usage\\services.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\Speech\\Idle.exe\", \"C:\\Program Files (x86)\\Google\\Temp\\csrss.exe\", \"C:\\Windows\\Help\\en-US\\SearchApp.exe\", \"C:\\Windows\\Globalization\\RuntimeBroker.exe\", \"C:\\Users\\All Users\\Oracle\\Java\\.oracle_jre_usage\\services.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1912 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5068 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2196 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3036 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3116 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5100 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2892 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2368 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 404 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 432 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5024 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 392 3772 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4536 3772 schtasks.exe 84 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
Executes dropped EXE 1 IoCs
pid Process 2500 services.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\Globalization\\RuntimeBroker.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Users\\All Users\\Oracle\\Java\\.oracle_jre_usage\\services.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Windows\\Speech\\Idle.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\Help\\en-US\\SearchApp.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\Help\\en-US\\SearchApp.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\Globalization\\RuntimeBroker.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Users\\All Users\\Oracle\\Java\\.oracle_jre_usage\\services.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Windows\\Speech\\Idle.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Google\\Temp\\csrss.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Google\\Temp\\csrss.exe\"" e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ipinfo.io 17 ipinfo.io -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCC86AB9FFAE04F14B8B44DD7D253CB2B.TMP csc.exe File created \??\c:\Windows\System32\-ue4vv.exe csc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Temp\csrss.exe e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe File created C:\Program Files (x86)\Google\Temp\886983d96e3d3e e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\Globalization\RuntimeBroker.exe e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe File created C:\Windows\Globalization\9e8d7a4ca61bd9 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe File created C:\Windows\Help\en-US\SearchApp.exe e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe File created C:\Windows\Help\en-US\38384e6a620884 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe File created C:\Windows\OCR\en-us\OfficeClickToRun.exe e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe File created C:\Windows\Speech\Idle.exe e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe File created C:\Windows\Speech\6ccacd8608530f e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3908 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3908 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3036 schtasks.exe 2080 schtasks.exe 4536 schtasks.exe 1912 schtasks.exe 2508 schtasks.exe 2436 schtasks.exe 5100 schtasks.exe 404 schtasks.exe 432 schtasks.exe 1972 schtasks.exe 2368 schtasks.exe 5024 schtasks.exe 5068 schtasks.exe 2196 schtasks.exe 3116 schtasks.exe 1988 schtasks.exe 2892 schtasks.exe 392 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe Token: SeDebugPrivilege 2500 services.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2812 wrote to memory of 5032 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 88 PID 2812 wrote to memory of 5032 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 88 PID 5032 wrote to memory of 816 5032 csc.exe 90 PID 5032 wrote to memory of 816 5032 csc.exe 90 PID 2812 wrote to memory of 3092 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 109 PID 2812 wrote to memory of 3092 2812 e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe 109 PID 3092 wrote to memory of 1712 3092 cmd.exe 111 PID 3092 wrote to memory of 1712 3092 cmd.exe 111 PID 3092 wrote to memory of 3908 3092 cmd.exe 112 PID 3092 wrote to memory of 3908 3092 cmd.exe 112 PID 3092 wrote to memory of 2500 3092 cmd.exe 116 PID 3092 wrote to memory of 2500 3092 cmd.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe"C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\aoqh05o0\aoqh05o0.cmdline"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9451.tmp" "c:\Windows\System32\CSCC86AB9FFAE04F14B8B44DD7D253CB2B.TMP"3⤵PID:816
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\axqFBXaG1P.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1712
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3908
-
-
C:\Users\All Users\Oracle\Java\.oracle_jre_usage\services.exe"C:\Users\All Users\Oracle\Java\.oracle_jre_usage\services.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Windows\Speech\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\Speech\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Windows\Speech\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Google\Temp\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Google\Temp\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 11 /tr "'C:\Windows\Help\en-US\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\Help\en-US\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\Windows\Help\en-US\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\Globalization\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\Globalization\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Windows\Globalization\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Oracle\Java\.oracle_jre_usage\services.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\All Users\Oracle\Java\.oracle_jre_usage\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Oracle\Java\.oracle_jre_usage\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066Ne" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066Ne" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4536
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD505f3b58f128b231d3f710164736d5614
SHA14a22b78ef247775b364265670482cdbaff3fc3f9
SHA256bd207017334c31602ea2cdd622d523e1d7558785bc7db7c4dec73acbb6d69477
SHA51231a1f3e1af2313c9a56b7bbc9f3e89ae23ce11899a7baf6611ee66d42e13d629fba908fc993ca650f8b9b338def2641df0bfba433bf777ebdafe8b8bf8370243
-
Filesize
189B
MD5fea677de669ce217a1d76dfedb469c53
SHA1b2893bc32f17d876f7cb530b876030873182689a
SHA256037a0a51f910e39ddeed37636bcdc0e6a0b512c66208c3b70b2bd59ac199eb62
SHA512d421778e54498bcc92bf32f4fe5da870fa923420ea1cd338d21fe07e8f0a39929e6b1b78f303dc7885f4aeb9cbb694d2024a61127e07108b8b9ba1577385320b
-
Filesize
1.8MB
MD5306c2d16a6c39850c1a960ecd5fd2e60
SHA19ad230d95a9ae4c42cc800e710fd0d6dc0abc208
SHA256e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066
SHA512458c70d255edae4928bb0c7773a63e647375cbcfb3e8cd058013aa59d0ca2b5db16a9a064aab30f948b24e6426a49dd20e0c6add6d6492382a41d35ff6a5bc58
-
Filesize
358B
MD50e81083cd6c243ea6995f1109c9a78b7
SHA1d0dbbeaa02d2749ab2c448326d9db065ec9aaaca
SHA2563184bad3a3ac0727fe61e42b3a319c0ddbda648f465fae777fe36aed4006fc30
SHA512b889f9708b17a1a4378550a7400ace6154ef3f5b4c357b3a63773f0074b5f4fd6a3388061e3b83ae25e90c6c6115f5523272a091aaa054dd90e4138e184ea4d8
-
Filesize
235B
MD524e448ea6de9904c46107a79a2a9aef6
SHA16cb313e745d2a3b450720f19d547f7256f16b18f
SHA256025a2003939d947382500486baca9b158acb8e7b187c6eb9f6317a026b5572f3
SHA5122975033fa4b8c63722fa2ce85fda9b51def4853c6f912098c6b840de7f44a2eef7cac3e9b02fa0b143dc20bb8708cbfc62c1e640ca227916a65e80974a5089d4
-
Filesize
1KB
MD555e11cb90667f1fab678a4e828c56cef
SHA11f604ad1253c81d68cc69ddc038c36170d5c5a6f
SHA2561ef1fa61853aecf37e821aa7a8ddc1b59f0633e534599c09d94511a9c83f5106
SHA512571bc673fabcaeed34d40803150692fe9b5bc8208870ee1673dd2a8c5f4675d3a55cbedf5b6cd28e0d937eb8565647b96ff3deecb45c658a05d66c7c2e4591df