Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe
Resource
win7-20240903-en
General
-
Target
8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe
-
Size
8.8MB
-
MD5
c4ec5a9f34b2f4a8a3e320ca3e7c2730
-
SHA1
956dc161c026dbbb4198a53cbe20e8985a2822aa
-
SHA256
8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8ac
-
SHA512
149632ab47aba710b9b1c9894c6ad9032ec482837d0102499c17e42ed737c89c006b201a631cefc1eda62dae92f505886a296b36cebc8ce246ba5dd8438a06f0
-
SSDEEP
98304:wIy9IywmbANrkwRXIy9IywmbANrkwRXIy9IywmbANrkwRXIy9IywmbANrkwCM70d:g/ZwT/ZwT/ZwT/Zw/oKmd0en
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Executes dropped EXE 3 IoCs
pid Process 2972 UpdatAuto.exe 2792 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN~4.exe 1252 Process not Found -
Loads dropped DLL 6 IoCs
pid Process 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 2972 UpdatAuto.exe 2972 UpdatAuto.exe 2972 UpdatAuto.exe 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\UpdatAuto.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Windows\SysWOW64\Option.bat UpdatAuto.exe File opened for modification C:\Windows\SysWOW64\UpdatAuto.exe UpdatAuto.exe File created C:\Windows\SysWOW64\Option.bat 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe UpdatAuto.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe UpdatAuto.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe UpdatAuto.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe UpdatAuto.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe UpdatAuto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe UpdatAuto.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1708 sc.exe 1160 sc.exe 2024 sc.exe 1484 sc.exe 2520 sc.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpdatAuto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 2972 UpdatAuto.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1504 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 30 PID 2960 wrote to memory of 1504 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 30 PID 2960 wrote to memory of 1504 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 30 PID 2960 wrote to memory of 1504 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 30 PID 2960 wrote to memory of 1504 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 30 PID 2960 wrote to memory of 1504 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 30 PID 2960 wrote to memory of 1504 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 30 PID 2960 wrote to memory of 2972 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 32 PID 2960 wrote to memory of 2972 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 32 PID 2960 wrote to memory of 2972 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 32 PID 2960 wrote to memory of 2972 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 32 PID 2960 wrote to memory of 2972 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 32 PID 2960 wrote to memory of 2972 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 32 PID 2960 wrote to memory of 2972 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 32 PID 2972 wrote to memory of 768 2972 UpdatAuto.exe 33 PID 2972 wrote to memory of 768 2972 UpdatAuto.exe 33 PID 2972 wrote to memory of 768 2972 UpdatAuto.exe 33 PID 2972 wrote to memory of 768 2972 UpdatAuto.exe 33 PID 2972 wrote to memory of 768 2972 UpdatAuto.exe 33 PID 2972 wrote to memory of 768 2972 UpdatAuto.exe 33 PID 2972 wrote to memory of 768 2972 UpdatAuto.exe 33 PID 2960 wrote to memory of 2792 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 35 PID 2960 wrote to memory of 2792 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 35 PID 2960 wrote to memory of 2792 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 35 PID 2960 wrote to memory of 2792 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 35 PID 2960 wrote to memory of 2328 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 37 PID 2960 wrote to memory of 2328 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 37 PID 2960 wrote to memory of 2328 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 37 PID 2960 wrote to memory of 2328 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 37 PID 2960 wrote to memory of 2328 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 37 PID 2960 wrote to memory of 2328 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 37 PID 2960 wrote to memory of 2328 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 37 PID 2960 wrote to memory of 2584 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 38 PID 2960 wrote to memory of 2584 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 38 PID 2960 wrote to memory of 2584 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 38 PID 2960 wrote to memory of 2584 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 38 PID 2960 wrote to memory of 2584 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 38 PID 2960 wrote to memory of 2584 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 38 PID 2960 wrote to memory of 2584 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 38 PID 2960 wrote to memory of 2592 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 39 PID 2960 wrote to memory of 2592 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 39 PID 2960 wrote to memory of 2592 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 39 PID 2960 wrote to memory of 2592 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 39 PID 2960 wrote to memory of 2592 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 39 PID 2960 wrote to memory of 2592 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 39 PID 2960 wrote to memory of 2592 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 39 PID 2960 wrote to memory of 2624 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 41 PID 2960 wrote to memory of 2624 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 41 PID 2960 wrote to memory of 2624 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 41 PID 2960 wrote to memory of 2624 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 41 PID 2960 wrote to memory of 2624 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 41 PID 2960 wrote to memory of 2624 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 41 PID 2960 wrote to memory of 2624 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 41 PID 2960 wrote to memory of 2652 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 42 PID 2960 wrote to memory of 2652 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 42 PID 2960 wrote to memory of 2652 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 42 PID 2960 wrote to memory of 2652 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 42 PID 2960 wrote to memory of 2652 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 42 PID 2960 wrote to memory of 2652 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 42 PID 2960 wrote to memory of 2652 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 42 PID 2960 wrote to memory of 3004 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 44 PID 2960 wrote to memory of 3004 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 44 PID 2960 wrote to memory of 3004 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 44 PID 2960 wrote to memory of 3004 2960 8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe"C:\Users\Admin\AppData\Local\Temp\8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat2⤵
- System Location Discovery: System Language Discovery
PID:1504
-
-
C:\Windows\SysWOW64\UpdatAuto.exeC:\Windows\system32\UpdatAuto.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat3⤵
- System Location Discovery: System Language Discovery
PID:768
-
-
-
C:\Users\Admin\AppData\Local\Temp\8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN~4.exe8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN~4.exe2⤵
- Executes dropped EXE
PID:2792
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop sharedaccess2⤵
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:1772
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop wscsvc2⤵
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:1624
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop srservice2⤵
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\net.exenet stop srservice3⤵
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice4⤵
- System Location Discovery: System Language Discovery
PID:752
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net start TlntSvr2⤵
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\net.exenet start TlntSvr3⤵
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TlntSvr4⤵
- System Location Discovery: System Language Discovery
PID:1320
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net user helpassistant 1234562⤵
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\net.exenet user helpassistant 1234563⤵
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user helpassistant 1234564⤵
- System Location Discovery: System Language Discovery
PID:2124
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net localgroup administrators helpassistant /add2⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\net.exenet localgroup administrators helpassistant /add3⤵
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators helpassistant /add4⤵
- System Location Discovery: System Language Discovery
PID:1368
-
-
-
-
C:\Windows\SysWOW64\sc.exesc config srservice start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2024
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1160
-
-
C:\Windows\SysWOW64\sc.exesc config srservice start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.9MB
MD56e458dd6831ac9fccc93a10ce08c0f85
SHA1898abcd78b8674b3c00f680e9cc12c23a7142e13
SHA25678cae3553ba1ef2507d1efd7b82404774c0213035bb2440a684216a05385fd59
SHA512e7668699a79750530e583671ae0349d3e5211cf04ea3604145fd9c82d7b3bbbffc6e5ec07df535a3d0b23d967d262056195e01a0cf038bd1e6126b3ada9def67
-
Filesize
9.8MB
MD5b3b723a7ce0424df0eca54e720ad4fca
SHA128a3f6f82c2b376f7fe262a9a73cf39b65c58d45
SHA256f31e67e17a9cf7984adced286b0bc0c4e48b134f46f7ee1e8f4fc76151bd611f
SHA512ac6903d9f88bcea475b3a20aa8a851cb6487f2e98a88d47acdee67cc7be3090ba2192b73035c3fdbc6ab6acee92486a62ac6b66d4b5460d907a9448248c31da0
-
Filesize
9.6MB
MD5407de406a70e9ab848bf3ea765d69b44
SHA13f7cb9ab77349a799741697bbaee5421990f42dc
SHA256d3c3626a27cf747dd03ebb82f08019dfdae6808a9c0e7409990c0d6166eeda40
SHA5126dc1e7a082928f725db7fd9de02bbe51d0dcdc5ee3f76c628fb06d7965cf41848a1a5ccf74c1237e867274d7911aea76fc46e607fbc4ee321e2efec68e122326
-
Filesize
9.3MB
MD5a62124eeb89eb6a4a9211c05f3191dc7
SHA156a1e359d515558c10e28f96748a325657b02b73
SHA25683cb2767583d97a38ce24543889738734652ab59a9becd496b9a3786662e72ce
SHA5129135678c0257ae0183e677175acc36c65c347fe00a3eebcf042bf69ec8631b921fac40bb4d26f627f4da9a10ae3b2ce7522b9c6086a9081e9ad42b6afd173d91
-
Filesize
9.3MB
MD5ed9c497583c5160bbae7c82dd4529897
SHA18b6a00fcced43819de782387c8c23fb7622b87d8
SHA256efc8f72f8c8e9634a2c0364336a47e634f8875785e38ba5d4971a1b6030b4c5c
SHA512aa2c25679e326b51d12085e38f4693e50c07b323810f4649e6c70e27d1d52150dcd3d6849c3abe46544d0f46add4c1e52b009a61c72cf5ec04a9d223d1837076
-
Filesize
9.7MB
MD578fbf99a0600adcf32ea2e1073b4fbba
SHA1379a3f040b345e3c370084a1a7b58dae3c53d3dd
SHA256143b69adeb34c65cb366f8a0f8ad099102ca5fcdd28eb20d8dd367621b2160fc
SHA5122b9ae729b229452c66d70f89d1e8d7f302bfb5ab5523a35230c0451e05053c40cf73173bde8d73dd872319a95c76495c0323b3199bc442a2a4c4e799079fab26
-
Filesize
9.4MB
MD56d7eaa0e0ee6b6238235a1dff06dd113
SHA16ac84addb84bde314d880d4d2d447296f5904ca2
SHA25669232d5e8b6f7898266f72ce5f5256ccecf2d59d9fc51d32b32a70a518d8d42b
SHA51215bb389699b86649940120736a7eecafe3971c4fcb040e057ac3228b127b921be860bd6215ec30ef72b47de765ba75987b8b646fd0905e387da34dad2a82a416
-
Filesize
8.8MB
MD50994436e7cabd4fe93ff890dd55e6739
SHA138ec2214c74fa70644ac5e7ecfb1c18384dea82b
SHA256c1a1586bf913b214cb16b27424d477d85622a4ddae9d1581b642a9065e903d32
SHA512645f11bd23bd6dd49c8af3f89fa511daa6430c12374e01b03e54c7ec9a2017945d527e2666b0c0f109011f12bab06f30aa85561e73538af34950ada1e608d4f6
-
Filesize
13.1MB
MD5b66625c30c95bbceffab5814135af107
SHA1325ad4534d1847e48677cfb319f3b2e88423763b
SHA25695aa97c4a53b4b8978e1f9b49e336361ae4776a4689e00d049dc84f32777ce55
SHA512e94ed2a0d938e8e55b3161ab7912e99f59fa461c5e9f8b6e400282894458f3fa75b072bc763d1569c10c8f07720177a6b8d6d192ea55825f1a3df29eced1c2c9
-
Filesize
13.1MB
MD518a16fe18c44d29b6ff04e46557b9a66
SHA1e205845ca6f5a739c92aeb7204b52568f91f707c
SHA2561a192f664aed98e583a347e45daa7e5666375bc52c406999901f33c8f64f8168
SHA512134442fdaaaa6d98542f1deee992012129a7e9384b98a95cdd3080edcd332173f9d0209b830a2be23b6dffbd83bd8b27c839b1f696014a46acfe909fe4382a40
-
Filesize
10.4MB
MD52d2f8ce1b570b7f10fe2204250ec3b6b
SHA1aa0fa8604dc3be63bb1df6eb46386da84fd6213f
SHA256c381e99b23ea95d03a3f70b8fde04d45e3c03099be42cee70cd1f7419003f760
SHA512d19ff041adbd6f1c120d9931d38fde586eb37482a283f72c0e0dae1f1a9fb667a49c35cb3885f4a696af9db30c3645712e6068ee78ebed8b1958308e0a8eaf7b
-
Filesize
10.4MB
MD5b85b0a5e5b065caf8ae29ed1bebc5c88
SHA11126722869f3c45862badb46edfef78d236bcb52
SHA256bca9c5f3ea7038c43d0d3d86eca6a8717b50d866d118eb8029a6c63266f9b192
SHA512ee598bfc62f829e615c8c5d9cc11f1257a1d5d481f4019c75ed0138c78a2161e543e844ab9132426fd5c25228a96ef22e4670263ac3d921842fc3c0bdc5bceaf
-
Filesize
10.0MB
MD5ede4be480736b02b301690b88197d849
SHA1bb1223446cb741a88cda38591bfc98f64dea75f4
SHA2564fd300f3d9681a7daa1f7c3c8ddaf113f98f818dec3e798d4ebdfdb3b292e0df
SHA51211a9da1fb1fbf8803d45d7b7ff9509b2c22a75333386364fab8bf8004ddf5ce3743f2b2fa11ad294fe5dbb900105c738e6f45922bd5cdce80ff3a5387e041100
-
Filesize
11.5MB
MD523ea7b123b880f5611f91b3e3a8f9b7a
SHA1d8dd42cfe69dc726ac4e038d4a1399e5c1a651ab
SHA2564d59c4145db7b6cf01bfae5bafa229c7913e1e64e95978f180746a1d2bb3214f
SHA51286c94b5430a671fc9dd047431597345e7266e11f5ab64f56ed980fa5030d111529eeffe8c99c0537acdc54831734fd49485572c4748069d0e80ada28b8084271
-
Filesize
9.8MB
MD5dc382a242a262fbabca371c405c47133
SHA137d7e8746a8dc6e50650732b396f4a3176128bc2
SHA25622eec97a2ac37ef228d6101db9786de1ac67f7f2169b8c86dc42bed1d3fed7ea
SHA5126a10359018bf7ac7789312f9f051213f350f2590d561a655e481bb94e86ea8de01571c57d67b9f237455a6612b8ca1ea624ff4de4249c736ccaffb1f4bdb0a1d
-
Filesize
8.8MB
MD5cf09ac053c0a0e90adf7f192b3284550
SHA18e1550b8573dfab5a858cf9ee8ba2833285526b3
SHA2562f08a9ca3866b03700283b272b6234e31c2468648245cae86ef7254a6908981e
SHA512a2d4741cca83c8b3025d4d3d42b5c98bb6ff40b1054a096147645df9c2238a16ac8a0a79db0d4bc2539a7ba692f6b75508ca163f911802e4ef829a1f0dac32c0
-
C:\Users\Admin\AppData\Local\Temp\8b31af8df83a8ccab552c95c68d9f6fea8166c02c0b887dd1b8634b284f6c8acN~4.exe
Filesize63KB
MD5e3c3615a1e91b534f91804e66e21c45c
SHA18eed287882744cf148c0fc820a9a4e3fc752fd84
SHA25668c2711a671d0d21fe92cc3f0b28b818e18176d100d956c6e2a91e422c0eec98
SHA51219db66f196c5fade72a51258545e3f1a736c4d874a099f10ac79788d55fdffffc2943c21c51ae839b0a7980e40c20c434254768f48b3fc847398faa926bd35b1
-
Filesize
53B
MD51d04abf39e9df55eed1d04430cc21eb8
SHA1b8292861dfd4e046eb9625e1571cc08c26094d41
SHA2560bc485263cf8a962e64db0b88f156f2a9af1b81ecfdb1cf9111d497e85df70f3
SHA512a2cccc03dadecf6a298b274a6735675aeec1cc280f84432498e9df31aa4a543d2557a2fd06bac4fc8778a774b30bbd31f91c1d0d3ace480b6217654c8d63a7d0
-
Filesize
8.8MB
MD53c1af0bca76d1f8d49373cf8998bced1
SHA1d5a7d6aa4ea83e6612c4ed54586c2fa30eec65a5
SHA2566b1318646708951e7973cdbf5fab3c87234aa811a21cc257e52058b5da69d7b5
SHA512719e2a1d53cdc7d20dbda0f4d27e8960270962d75e9b7cac0481485521d8c4a6e83748504968002e694bc098766b10191fedc31bc8b9b48350a187ecfd59cc84
-
Filesize
8.8MB
MD59bb5be52c12b2b1d2357840dbd63e2b3
SHA11b4f6cdf5257949da76a2db01e46440d3cac7d26
SHA2562d4f84e8586922571c04448adc59a45fc3e9f4924515ddc4d68a5a63ab7d0643
SHA5127e270b366495ec9701cd466c22eb4f1396edee207a3d9276c2a69633b090fa431b77e85eb22a412a4f17cad8aee365f879401670f593c8cf1add786f681703a0
-
Filesize
8.8MB
MD5c2be7e5893329165912c02edbbbac199
SHA145222c24bae5ee6253fe6cbdca5e6923458f5818
SHA256d79a89b0abe4a646a9e473a6ed4abef5a9912e68ab054b87f855816434f18b85
SHA512d622bdf27221bd322e010f067725d8b6fcaed72891258281e8557bf9ce9d8bb5004b27ec376d140bdcddafee97ae6aeb9db34499e6fa5e3a672589c638aa1242
-
Filesize
8.8MB
MD5f8281d4c2d18b4aa7dc9eeb7552e6cf6
SHA15a737b83fee30fa68d88e5e1acd58a6ecb1ec074
SHA256f6967dd32f5214c2b3a0ec27c2037c70da1e2d09db5c3a2f6d76e7a5e3a3dfc3
SHA512d66d82824fec02d106f7bfd8dab4ccb83f93b81d48853f89c3985d7c9e08131abad55d59a519e946ef3c75fcddbc9226d6dcfdd9c776da636a87bf1ffe5959c9
-
Filesize
8.8MB
MD5a55d82d895fa161062c180f8df924051
SHA167d7b702b61832703c45373521c7d645343b3062
SHA256facbdae535499b8b3ccb139c96115a6485e8fa327c4deac22bfd59bbd19bf25e
SHA512d09abc10a78dc4887ba5fae70acb263f397bad24364990ea064b5d530eb36caf82aff9ba201961a4fa7ae519da4d2a3d45bf7eb73c8dc91d3867b768ce6921f7
-
Filesize
8.8MB
MD52815b0a205ec60c2ff96df1578b93451
SHA1ad81b6c6925575b1fc6e97f0f64e15a46dfcb427
SHA25669efb86301f59eaa48539f83493d39037840af80a39c4f616ff6acfce19c5e8a
SHA512cdccc9f755a2c6ae32c7d2b801e09baf6c12063533536b1eea84f2433812c0e77418ab7114ae8c8d99e14c10a267569ee0b306589e13456052d0bf51149bf9bf
-
Filesize
8.8MB
MD5eb8357da2eb9608207439ff0bbf3f591
SHA1a052332f28ba558a69cc41bb11ff09b3ae9412e6
SHA256bb03095faab04638b2bd220347a1686fad35744871f911f87859aef2cb8218ff
SHA512aa4f8fc534f27cb3e9a1580641af2254a66b3001362f9e5fa24eb4a57ae5cccef9deb6246c2d97ce508487e0d31f05e9e1dc3876ab9eead824cca9bcdd4cdbdb
-
Filesize
8.8MB
MD5576794c73a47885e79ca8efea51393f8
SHA1d78fa19bab86b451551070ea556b236b58fcf196
SHA25632480b3c80d9037afdf97b352202d8816255f33d799df22351bd0cf92077b45c
SHA512a9f35e94b679686f40b57890c8cdb63203b4179cb5bfb8d176778dbe224caa20f0020600b7709034208db899a405b535fb376f5e3959f8ac11527536ba2e4acf
-
Filesize
8.8MB
MD5d00501bf58ca2cf311c44d1d63e7b71e
SHA175bac882b5f4ca707cf9a97f77d9b819589626d9
SHA25665a994daf8274b29738ceaa7a979b312aaac041cf5392d8962323fdc74c3320b
SHA5128cc9d90e7dac630071c2059c2e60152aae9e2592e42477fc5590fc9490272cf8603db56b115f590d1019f5cd516933edc3681a307c388f3731ed6d61d1ca8fd9
-
Filesize
8.8MB
MD58ab60dd83db26e758fbd5a4a5f77e988
SHA1e9b85165606b26144aab2e916bfffb1dbf746f52
SHA256c5b439ae43bd672b845992d7dba0c305d0414b521b8a26ac4e77c73917c9db49
SHA512c50d1b57c03d3b399ce95514922bae3db76f9990a281e61c8b400358a523c8457f803c3a5797859f10d9efe803ee31e4f815e39a33b9318ec742f998a528af04
-
Filesize
8.8MB
MD5951bddb273b9a651313013ffd760f826
SHA1921866d9186e84cdcb409ef9244484cd3b38b1ad
SHA256967503ad9759a6fca0d6f8a621fe30f5d6ec5b844e4b4f2ac178445d6b9f778e
SHA5129b08d56c50c2caa3d93929b2f36d832c1ede37155213b58ed3422c3a3a70db09d9d3b222359bac9c44e3eeb77afe03b471fb3c8d95caf5c724d54d48578d9e3a
-
Filesize
8.8MB
MD57138625acefe854c08725864992358f3
SHA1a4b21fd7884d4c40ab4bdc4a2342fa4a1e69af69
SHA256b25019c5aa8f5fed2e91f35b29197b87e0e41d84d551f9b157905181ca2ffca9
SHA5128a6368fd1a9acb1c2c73095f747c7d048a04d1f515664ca5040be112b380d4dcaefac79f4af8cbb826474964371d1dcef1c44d7a3754b7b0e46ac4e7cce16980