Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-10-2024 14:38
Static task
static1
Behavioral task
behavioral1
Sample
main.exe
Resource
win10-20240404-en
General
-
Target
main.exe
-
Size
5.6MB
-
MD5
3d3c49dd5d13a242b436e0a065cd6837
-
SHA1
e38a773ffa08452c449ca5a880d89cfad24b6f1b
-
SHA256
e0338c845a876d585eceb084311e84f3becd6fa6f0851567ba2c5f00eeaf4ecf
-
SHA512
dd0e590310392b0543d47a2d24d55f6f091ba59acc0d7ea533039ffb48f1b8938587889bcfa19b0538a62ba26fcde2172253860ceab34af40fd7bf65b6587b00
-
SSDEEP
98304:nsl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6UcR6s:nPOuK6mn9NzgMoYkSIvUcwti7TQlvciY
Malware Config
Signatures
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Modifies WinLogon for persistence 2 TTPs 5 IoCs
Processes:
ChainComServermonitor.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\taskhostw.exe\", \"C:\\Windows\\ShellExperiences\\winlogon.exe\", \"C:\\Windows\\it-IT\\fontdrvhost.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\taskhostw.exe\", \"C:\\Windows\\ShellExperiences\\winlogon.exe\", \"C:\\Windows\\it-IT\\fontdrvhost.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\taskhostw.exe\", \"C:\\Windows\\ShellExperiences\\winlogon.exe\", \"C:\\Windows\\it-IT\\fontdrvhost.exe\", \"C:\\Recovery\\WindowsRE\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\InstallAgent.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\taskhostw.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Public\\taskhostw.exe\", \"C:\\Windows\\ShellExperiences\\winlogon.exe\"" ChainComServermonitor.exe -
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 304 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2964 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1900 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4736 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1156 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3340 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4424 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1188 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 396 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1268 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4268 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 1328 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4668 1328 schtasks.exe -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
Update.exesvchost64.exeChainComServermonitor.exeInstallAgent.exeInstallAgent.exeInstallAgent.exepid process 2604 Update.exe 4076 svchost64.exe 2812 ChainComServermonitor.exe 2628 InstallAgent.exe 2940 InstallAgent.exe 4272 InstallAgent.exe -
Loads dropped DLL 2 IoCs
Processes:
main.exeUpdate.exepid process 5036 main.exe 2604 Update.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 11 IoCs
Processes:
ChainComServermonitor.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\it-IT\\fontdrvhost.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\it-IT\\fontdrvhost.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\InstallAgent = "\"C:\\Recovery\\WindowsRE\\InstallAgent.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Users\\Public\\taskhostw.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Users\\Public\\taskhostw.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\ShellExperiences\\winlogon.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\WindowsRE\\dllhost.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\InstallAgent = "\"C:\\Recovery\\WindowsRE\\InstallAgent.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\ShellExperiences\\winlogon.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Recovery\\WindowsRE\\dllhost.exe\"" ChainComServermonitor.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 3 raw.githubusercontent.com 4 raw.githubusercontent.com 8 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Drops file in System32 directory 2 IoCs
Processes:
csc.exedescription ioc process File created \??\c:\Windows\System32\CSC51F5EC01B60F415BA3659E822CD18A1.TMP csc.exe File created \??\c:\Windows\System32\b5-3tw.exe csc.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Drops file in Windows directory 4 IoCs
Processes:
ChainComServermonitor.exedescription ioc process File created C:\Windows\it-IT\fontdrvhost.exe ChainComServermonitor.exe File created C:\Windows\it-IT\5b884080fd4f94 ChainComServermonitor.exe File created C:\Windows\ShellExperiences\winlogon.exe ChainComServermonitor.exe File created C:\Windows\ShellExperiences\cc11b995f2a76d ChainComServermonitor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost64.exeWScript.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Update.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3464 timeout.exe -
Modifies registry class 4 IoCs
Processes:
svchost64.exeChainComServermonitor.exeInstallAgent.exeInstallAgent.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings svchost64.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings ChainComServermonitor.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings InstallAgent.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings InstallAgent.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 396 schtasks.exe 2964 schtasks.exe 4736 schtasks.exe 4424 schtasks.exe 1188 schtasks.exe 304 schtasks.exe 1900 schtasks.exe 1060 schtasks.exe 3340 schtasks.exe 1268 schtasks.exe 4668 schtasks.exe 2104 schtasks.exe 1156 schtasks.exe 4268 schtasks.exe 1288 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
main.exeUpdate.exepid process 5036 main.exe 5036 main.exe 5036 main.exe 5036 main.exe 5036 main.exe 5036 main.exe 5036 main.exe 5036 main.exe 5036 main.exe 5036 main.exe 5036 main.exe 5036 main.exe 5036 main.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe 2604 Update.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
main.exetasklist.exeUpdate.exeChainComServermonitor.exeInstallAgent.exeInstallAgent.exeInstallAgent.exedescription pid process Token: SeDebugPrivilege 5036 main.exe Token: SeDebugPrivilege 972 tasklist.exe Token: SeDebugPrivilege 2604 Update.exe Token: SeDebugPrivilege 2812 ChainComServermonitor.exe Token: SeDebugPrivilege 2628 InstallAgent.exe Token: SeDebugPrivilege 2940 InstallAgent.exe Token: SeDebugPrivilege 4272 InstallAgent.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Update.exeOpenWith.exepid process 2604 Update.exe 3012 OpenWith.exe -
Suspicious use of WriteProcessMemory 57 IoCs
Processes:
main.execmd.exeUpdate.execmd.exesvchost64.exeWScript.execmd.exeChainComServermonitor.execsc.execsc.execmd.exeInstallAgent.execmd.exeInstallAgent.execmd.exedescription pid process target process PID 5036 wrote to memory of 4676 5036 main.exe cmd.exe PID 5036 wrote to memory of 4676 5036 main.exe cmd.exe PID 4676 wrote to memory of 972 4676 cmd.exe tasklist.exe PID 4676 wrote to memory of 972 4676 cmd.exe tasklist.exe PID 4676 wrote to memory of 976 4676 cmd.exe find.exe PID 4676 wrote to memory of 976 4676 cmd.exe find.exe PID 4676 wrote to memory of 3464 4676 cmd.exe timeout.exe PID 4676 wrote to memory of 3464 4676 cmd.exe timeout.exe PID 4676 wrote to memory of 2604 4676 cmd.exe Update.exe PID 4676 wrote to memory of 2604 4676 cmd.exe Update.exe PID 2604 wrote to memory of 1672 2604 Update.exe cmd.exe PID 2604 wrote to memory of 1672 2604 Update.exe cmd.exe PID 1672 wrote to memory of 3480 1672 cmd.exe reg.exe PID 1672 wrote to memory of 3480 1672 cmd.exe reg.exe PID 2604 wrote to memory of 4076 2604 Update.exe svchost64.exe PID 2604 wrote to memory of 4076 2604 Update.exe svchost64.exe PID 2604 wrote to memory of 4076 2604 Update.exe svchost64.exe PID 4076 wrote to memory of 4908 4076 svchost64.exe WScript.exe PID 4076 wrote to memory of 4908 4076 svchost64.exe WScript.exe PID 4076 wrote to memory of 4908 4076 svchost64.exe WScript.exe PID 4908 wrote to memory of 1296 4908 WScript.exe cmd.exe PID 4908 wrote to memory of 1296 4908 WScript.exe cmd.exe PID 4908 wrote to memory of 1296 4908 WScript.exe cmd.exe PID 1296 wrote to memory of 2812 1296 cmd.exe ChainComServermonitor.exe PID 1296 wrote to memory of 2812 1296 cmd.exe ChainComServermonitor.exe PID 2812 wrote to memory of 1464 2812 ChainComServermonitor.exe csc.exe PID 2812 wrote to memory of 1464 2812 ChainComServermonitor.exe csc.exe PID 1464 wrote to memory of 1616 1464 csc.exe cvtres.exe PID 1464 wrote to memory of 1616 1464 csc.exe cvtres.exe PID 2812 wrote to memory of 2352 2812 ChainComServermonitor.exe csc.exe PID 2812 wrote to memory of 2352 2812 ChainComServermonitor.exe csc.exe PID 2352 wrote to memory of 3328 2352 csc.exe cvtres.exe PID 2352 wrote to memory of 3328 2352 csc.exe cvtres.exe PID 2812 wrote to memory of 3116 2812 ChainComServermonitor.exe cmd.exe PID 2812 wrote to memory of 3116 2812 ChainComServermonitor.exe cmd.exe PID 3116 wrote to memory of 204 3116 cmd.exe chcp.com PID 3116 wrote to memory of 204 3116 cmd.exe chcp.com PID 3116 wrote to memory of 1108 3116 cmd.exe w32tm.exe PID 3116 wrote to memory of 1108 3116 cmd.exe w32tm.exe PID 3116 wrote to memory of 2628 3116 cmd.exe InstallAgent.exe PID 3116 wrote to memory of 2628 3116 cmd.exe InstallAgent.exe PID 2628 wrote to memory of 4692 2628 InstallAgent.exe cmd.exe PID 2628 wrote to memory of 4692 2628 InstallAgent.exe cmd.exe PID 4692 wrote to memory of 1976 4692 cmd.exe chcp.com PID 4692 wrote to memory of 1976 4692 cmd.exe chcp.com PID 4692 wrote to memory of 4104 4692 cmd.exe PING.EXE PID 4692 wrote to memory of 4104 4692 cmd.exe PING.EXE PID 4692 wrote to memory of 2940 4692 cmd.exe InstallAgent.exe PID 4692 wrote to memory of 2940 4692 cmd.exe InstallAgent.exe PID 2940 wrote to memory of 4472 2940 InstallAgent.exe cmd.exe PID 2940 wrote to memory of 4472 2940 InstallAgent.exe cmd.exe PID 4472 wrote to memory of 1876 4472 cmd.exe chcp.com PID 4472 wrote to memory of 1876 4472 cmd.exe chcp.com PID 4472 wrote to memory of 976 4472 cmd.exe w32tm.exe PID 4472 wrote to memory of 976 4472 cmd.exe w32tm.exe PID 4472 wrote to memory of 4272 4472 cmd.exe InstallAgent.exe PID 4472 wrote to memory of 4272 4472 cmd.exe InstallAgent.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp8D2C.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp8D2C.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 5036"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:976
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:3464
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f4⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:3480
-
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\svchost64.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\svchost64.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe"C:\Users\Admin\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe"7⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\g4sx5x13\g4sx5x13.cmdline"8⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8A3A.tmp" "c:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\CSCEF7FD2C27A744ABF81BEA4990AA9922.TMP"9⤵PID:1616
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5kvqufko\5kvqufko.cmdline"8⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8A78.tmp" "c:\Windows\System32\CSC51F5EC01B60F415BA3659E822CD18A1.TMP"9⤵PID:3328
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9bPLCGTY5H.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:204
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:1108
-
-
C:\Recovery\WindowsRE\InstallAgent.exe"C:\Recovery\WindowsRE\InstallAgent.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AntDRUzUoe.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\system32\chcp.comchcp 6500111⤵PID:1976
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4104
-
-
C:\Recovery\WindowsRE\InstallAgent.exe"C:\Recovery\WindowsRE\InstallAgent.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cBuNLwd5vp.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\system32\chcp.comchcp 6500113⤵PID:1876
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:976
-
-
C:\Recovery\WindowsRE\InstallAgent.exe"C:\Recovery\WindowsRE\InstallAgent.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3012
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\Users\Public\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Public\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Users\Public\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Windows\ShellExperiences\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\ShellExperiences\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Windows\ShellExperiences\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Windows\it-IT\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\it-IT\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Windows\it-IT\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "InstallAgentI" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\InstallAgent.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "InstallAgent" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\InstallAgent.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "InstallAgentI" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\InstallAgent.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1900
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bb987b943ab9637f57b430c5c3c7f120
SHA106fe9081a43d23c9537f44a3cef2de6826e9cf42
SHA256651c0afdea1507e6c6be1f97f003c2f40000403504adb5c9f3d581b3349c492f
SHA5126221bbcf0a618f7cbb25238d6fbb3d75d3d03ca3df4f806b0991ab0fa43ad783acf549c81724c7e65eebebe6ca70557ff874b8d74708447a9999c0ef0558c6f5
-
Filesize
214B
MD5460982331822868206db9109d42723c4
SHA107140caf4ae1a8c721c3e3d1b5d0d18e495a0214
SHA256ffe436a3a8ac5d972358a0bdb20b8a00ffec16b53952777ca2ed61751d8bd6c2
SHA51231b9ecc4d08645ccfa65b0930bd2053bb6d5495e4972e9c78aaa6363d71b88f64c2a9d4e193ac7bd3ec0e706f25ca3c0f1bd6d70ab042f9fddff284ba290b354
-
Filesize
166B
MD58b836953cdba7b48140076aac87ec174
SHA1bcab28953814f878735c74af60cffc0bd15dd967
SHA256af1d4d9f5e5f7367b9da769022aef47027723ae4865cbcd3071b03e41a73a865
SHA51283c9f09a76a256517a1bcd2d96fc2ce54a69fc7d6226bd171899abd6283e9130eefd5c9e291d802e3ec2806321f969e85d6a9240afe57405eb44e4937ba441ae
-
Filesize
1KB
MD5d69ca48481c8da8cbf93cbf3012b25e8
SHA1f7716d76118ab170a45272fbabc8a3eae35522ac
SHA256265710e0ab7e6edfdeb391f363dc62a217d86f8571f1338638540a11c40a0e1c
SHA512c962b57e3ecbcf5a6e1e43f28b666668bdefb6e6677c90b2a0a4c1c11961fa863ff5da79cbaa85602616bea5817226d2d826ce023e7da9490267c396c5b7a7fa
-
Filesize
1KB
MD5001613600c7f7e6eec562d8ae2a24ff5
SHA151bf94f27ea9f7de1e77ffb11a772a7a10341e59
SHA2564736cca5264ce6a596aaf72394262f19b23689fde0f3f056f7487c6f81c04a21
SHA512af1b512a7b0ef0ab2258b05a50367cf717a2ef1ccef7e5c017fa56917317a40a5a134a7b4094a6f4595cf32b4f01f4ae0ecec06676d19d6b8b78d7fba4891c25
-
Filesize
214B
MD5e21fd0cce9ab37fd4d8c599c59314d98
SHA1a8e9df54162052e4a706d75ca309fe8aec5d637f
SHA256510646f7497f2bb5099017d16e2a465173bbf606c873bae9ada85a6289e54432
SHA51207d9e44d33a2b85d4eb701313740e9ab9596f20e8a96a819ea621e942c5a805cf93989dda76daf028e61d387ff672aff3ed53840b825f7fd7703e6ed81086cee
-
Filesize
3.5MB
MD55fe249bbcc644c6f155d86e8b3cc1e12
SHA1f5c550ab2576d2daeff9cb72a4d41d1bcfee0e6d
SHA2569308b0ce7206c60517db7207c488b4fa1cc313413e5378d8bac63b22cabcdd80
SHA512b210c6b5d8db31d8f4ea82a79fe4679ced289636570e3fd72a45c488fd2cd75ed74677d723c1bfa67432e46e71901cb6551595e1053448c2f5e297829a6e1b39
-
Filesize
103B
MD577218ae27e9ad896918d9a081c61b1be
SHA13c8ebaa8fa858b82e513ccf482e11172b0f52ce0
SHA256e09540a47f3647a9fdf9673281e2664441bbaee8d3236d22b1875b9d23abacab
SHA5126a16b367a762132172830fd81c41c58ac49de788eed93d4c5526f8f0e6859703b336a137fd8d4fe7088b4110d72e5f4767b6462bc4651769924b67305719f30a
-
C:\Users\Admin\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe
Filesize217B
MD5d6da6166258e23c9170ee2a4ff73c725
SHA1c3c9d6925553e266fe6f20387feee665ce3e4ba9
SHA25678ee67a8ae359f697979f4cd3c7228d3235c32d3b611303e070b71414591ba1e
SHA51237a5a18acbb56e5458baebb12a4d3b3229b218eb606be3535d1c30e8e0d4fa969543889c587078456321209fe4503688432f45ff35a7af598b770393e7ae3b05
-
Filesize
256B
MD5bc415c7248350833db0d98c5962f1f9f
SHA13f0769c3d19c394acc762890bffccabb84dae5ed
SHA25655bd35d394e631647eac6bd719228fc4381d85fdeead5414dd445f30e80b3799
SHA512da0d735bb2c0e9e234ef219876918bb04dcb9ffca1c4d629efff5e0fd68f9299501019a4f95b781ed7093d437b9853de7667fb0051936077b1399c2d554d4564
-
Filesize
5.6MB
MD53d3c49dd5d13a242b436e0a065cd6837
SHA1e38a773ffa08452c449ca5a880d89cfad24b6f1b
SHA256e0338c845a876d585eceb084311e84f3becd6fa6f0851567ba2c5f00eeaf4ecf
SHA512dd0e590310392b0543d47a2d24d55f6f091ba59acc0d7ea533039ffb48f1b8938587889bcfa19b0538a62ba26fcde2172253860ceab34af40fd7bf65b6587b00
-
Filesize
3.9MB
MD545c59202dce8ed255b4dbd8ba74c630f
SHA160872781ed51d9bc22a36943da5f7be42c304130
SHA256d07c47f759245d34a5b94786637c3d2424c7e3f3dea3d738d95bf4721dbf3b16
SHA512fff5b16ae38681ed56782c0f0423560dab45065685d7272424206f43c80486318180aa22d66bd197c8c530e4c24dbaaaa020beb76b619dc767ee59faa27e23ed
-
Filesize
361B
MD5748c04d5b0b4b699a8646d0a8d8533cc
SHA14319d38d52d95800e6f7c1aaee0317e04dc295ee
SHA256df5c0bafa3880c84bbecb138045e0ba3988fa94eee5b2e555ec023ba31cf28f4
SHA5121a370c1702b4f2ab261e7d73f2e194e7c48f0ad0ea631cb91111eba97bccb41020eb83fbcc3aa76e1eff67817cef1723f0fd1efc67106ca6c86f46347a8731a1
-
Filesize
235B
MD59b301abc6c3472be29240762a2a04a4e
SHA15210ade5800e25f2fc6b951ed70b8337dae54883
SHA2565ff6a53737ad0a157e777f36972781ea2f34a378312004d52f511b1645b4eebe
SHA5128cd3d6b166d8dc4c7befcddaa57814ebb7edbd5153d9ed2e1fe83778128f407661f7e888c085952ee9273331e2d84f4c126e2739020bc5238b1bb17ff1c2f50f
-
Filesize
394B
MD5a1a9b32df365b5ead3f8491c04f886a9
SHA162d8cb1cd3617801ccefd5ed005e0d570590ae23
SHA2567204abebed4904df76f45d09161ba90582604c8bcc390fd543358ccc9fce6bf2
SHA51278338d7cfb27eceb6d2161e240a4d7f3df9aee22357589a1f028a9d028b987b055bb466c64b38bf3f96254920c1ea2cc5f6e30b89caa1ad353c07b8328dfeaeb
-
Filesize
268B
MD549c84f844ae317e955856b69db0f3092
SHA11507cc1e1ada4c5150dca95e13f8b04ae9e4b53f
SHA2563e529658ba688cca75e9f84150f9da7d6d3a75dc0c8dc0df2dda2c59b9855458
SHA5125766ac2dcff638cb8a0849cb0caf50224abcf25a1507dad658d53ae2dbd652a58db0e55195d233339972ca557a73015a7237e9f12a239f464d10bd056cc6795a
-
Filesize
1KB
MD5bf38fe42913aaab3060562f036c56781
SHA12569e40a60e393e85be2c50cfa830c2e1430822c
SHA2560e8f131ad2ed72fddaea0919a88aedfa09cfe5ae30f6fd675ab1fd7ece211cac
SHA51242d67abd60177063dc22601c7b0c76aa53000d3196a2bb4c123d2992b907518850c767b2097e0663941ae6c292d95ef08569156e2a286e996662d541d6986f86
-
Filesize
1KB
MD56d2e1afd58a144bc17ed280b510c7ca8
SHA18f0802f6a4e75cd6870573a8e8ed51c634ef5653
SHA25609d6068e26bfa3a6148b45d54c66d9f8ca9e8792869d7b22da28aa73373e0895
SHA5125a3622b68416e2190f1fa793319f4b4813e0000ed67452e1a7716e8726488d1e929f5ff0a6f299d7132054de84aace4b21d3b5e2ea939da050cb65076b76a1de
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d