Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 04:12
Behavioral task
behavioral1
Sample
bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe
Resource
win10v2004-20241007-en
General
-
Target
bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe
-
Size
8.2MB
-
MD5
51afbe00ab7ef0098ff0dfa7a1a78f04
-
SHA1
1d783e79b9b74e44b1ecd98c882cf2a6270cd584
-
SHA256
bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b
-
SHA512
aef6f0a60939babbbdaf7761f5d8b4168086be1a951e3f1c1fa853596e6785cbc3e9e4e0d4284140f4018f773a2697a7d8272d21013438da8cf34c95feb34bd4
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNece:V8e8e8f8e8e8r
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 6 IoCs
Processes:
resource yara_rule C:\Windows\system\explorer.exe warzonerat behavioral1/memory/2840-52-0x00000000031E0000-0x00000000032F4000-memory.dmp warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat \Windows\system\spoolsv.exe warzonerat behavioral1/memory/2940-102-0x00000000031D0000-0x00000000032E4000-memory.dmp warzonerat behavioral1/memory/2940-133-0x00000000031D0000-0x00000000032E4000-memory.dmp warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Processes:
resource yara_rule C:\Windows\system\explorer.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 -
Executes dropped EXE 13 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exesvchost.exepid process 2992 explorer.exe 2940 explorer.exe 844 spoolsv.exe 2476 spoolsv.exe 2340 spoolsv.exe 1380 spoolsv.exe 1940 spoolsv.exe 2324 spoolsv.exe 2228 spoolsv.exe 2676 spoolsv.exe 2300 spoolsv.exe 2644 spoolsv.exe 2136 svchost.exe -
Loads dropped DLL 64 IoCs
Processes:
bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exeexplorer.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 2840 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe 2840 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2356 WerFault.exe 2356 WerFault.exe 2356 WerFault.exe 2356 WerFault.exe 2356 WerFault.exe 2356 WerFault.exe 2356 WerFault.exe 2940 explorer.exe 2940 explorer.exe 268 WerFault.exe 268 WerFault.exe 268 WerFault.exe 268 WerFault.exe 268 WerFault.exe 268 WerFault.exe 268 WerFault.exe 2940 explorer.exe 2940 explorer.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 1604 WerFault.exe 2940 explorer.exe 2940 explorer.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2940 explorer.exe 2940 explorer.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 2940 explorer.exe 2940 explorer.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2940 explorer.exe 2940 explorer.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exebfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exeexplorer.exespoolsv.exedescription pid process target process PID 3068 set thread context of 2840 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe PID 3068 set thread context of 2540 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe diskperf.exe PID 2992 set thread context of 2940 2992 explorer.exe explorer.exe PID 2992 set thread context of 1036 2992 explorer.exe diskperf.exe PID 844 set thread context of 2644 844 spoolsv.exe spoolsv.exe PID 844 set thread context of 2980 844 spoolsv.exe diskperf.exe -
Drops file in Windows directory 5 IoCs
Processes:
explorer.exespoolsv.exebfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process 2356 2476 WerFault.exe 268 2340 WerFault.exe 1604 1380 WerFault.exe 2184 1940 WerFault.exe spoolsv.exe 1852 2324 WerFault.exe spoolsv.exe 2672 2228 WerFault.exe spoolsv.exe 2648 2676 WerFault.exe spoolsv.exe 1720 2300 WerFault.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exespoolsv.exespoolsv.exesvchost.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exebfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exeexplorer.exepid process 2840 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2940 explorer.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exeexplorer.exespoolsv.exepid process 2840 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe 2840 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2940 explorer.exe 2644 spoolsv.exe 2644 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exebfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 3068 wrote to memory of 2840 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe PID 3068 wrote to memory of 2840 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe PID 3068 wrote to memory of 2840 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe PID 3068 wrote to memory of 2840 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe PID 3068 wrote to memory of 2840 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe PID 3068 wrote to memory of 2840 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe PID 3068 wrote to memory of 2840 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe PID 3068 wrote to memory of 2840 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe PID 3068 wrote to memory of 2840 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe PID 3068 wrote to memory of 2540 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe diskperf.exe PID 3068 wrote to memory of 2540 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe diskperf.exe PID 3068 wrote to memory of 2540 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe diskperf.exe PID 3068 wrote to memory of 2540 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe diskperf.exe PID 3068 wrote to memory of 2540 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe diskperf.exe PID 3068 wrote to memory of 2540 3068 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe diskperf.exe PID 2840 wrote to memory of 2992 2840 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe explorer.exe PID 2840 wrote to memory of 2992 2840 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe explorer.exe PID 2840 wrote to memory of 2992 2840 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe explorer.exe PID 2840 wrote to memory of 2992 2840 bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe explorer.exe PID 2992 wrote to memory of 2940 2992 explorer.exe explorer.exe PID 2992 wrote to memory of 2940 2992 explorer.exe explorer.exe PID 2992 wrote to memory of 2940 2992 explorer.exe explorer.exe PID 2992 wrote to memory of 2940 2992 explorer.exe explorer.exe PID 2992 wrote to memory of 2940 2992 explorer.exe explorer.exe PID 2992 wrote to memory of 2940 2992 explorer.exe explorer.exe PID 2992 wrote to memory of 2940 2992 explorer.exe explorer.exe PID 2992 wrote to memory of 2940 2992 explorer.exe explorer.exe PID 2992 wrote to memory of 2940 2992 explorer.exe explorer.exe PID 2992 wrote to memory of 1036 2992 explorer.exe diskperf.exe PID 2992 wrote to memory of 1036 2992 explorer.exe diskperf.exe PID 2992 wrote to memory of 1036 2992 explorer.exe diskperf.exe PID 2992 wrote to memory of 1036 2992 explorer.exe diskperf.exe PID 2992 wrote to memory of 1036 2992 explorer.exe diskperf.exe PID 2992 wrote to memory of 1036 2992 explorer.exe diskperf.exe PID 2940 wrote to memory of 844 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 844 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 844 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 844 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 2476 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 2476 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 2476 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 2476 2940 explorer.exe spoolsv.exe PID 2476 wrote to memory of 2356 2476 spoolsv.exe WerFault.exe PID 2476 wrote to memory of 2356 2476 spoolsv.exe WerFault.exe PID 2476 wrote to memory of 2356 2476 spoolsv.exe WerFault.exe PID 2476 wrote to memory of 2356 2476 spoolsv.exe WerFault.exe PID 2940 wrote to memory of 2340 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 2340 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 2340 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 2340 2940 explorer.exe spoolsv.exe PID 2340 wrote to memory of 268 2340 spoolsv.exe WerFault.exe PID 2340 wrote to memory of 268 2340 spoolsv.exe WerFault.exe PID 2340 wrote to memory of 268 2340 spoolsv.exe WerFault.exe PID 2340 wrote to memory of 268 2340 spoolsv.exe WerFault.exe PID 2940 wrote to memory of 1380 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 1380 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 1380 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 1380 2940 explorer.exe spoolsv.exe PID 1380 wrote to memory of 1604 1380 spoolsv.exe WerFault.exe PID 1380 wrote to memory of 1604 1380 spoolsv.exe WerFault.exe PID 1380 wrote to memory of 1604 1380 spoolsv.exe WerFault.exe PID 1380 wrote to memory of 1604 1380 spoolsv.exe WerFault.exe PID 2940 wrote to memory of 1940 2940 explorer.exe spoolsv.exe PID 2940 wrote to memory of 1940 2940 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe"C:\Users\Admin\AppData\Local\Temp\bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe"C:\Users\Admin\AppData\Local\Temp\bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:844 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2644 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2136
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:2980
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2356
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 366⤵
- Loads dropped DLL
- Program crash
PID:268
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1604
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2184
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1852
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2672
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2648
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 366⤵
- Program crash
PID:1720
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:1036
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD551afbe00ab7ef0098ff0dfa7a1a78f04
SHA11d783e79b9b74e44b1ecd98c882cf2a6270cd584
SHA256bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b
SHA512aef6f0a60939babbbdaf7761f5d8b4168086be1a951e3f1c1fa853596e6785cbc3e9e4e0d4284140f4018f773a2697a7d8272d21013438da8cf34c95feb34bd4
-
Filesize
8.2MB
MD5eef628e30f81468095da6f63cbfb2cb4
SHA1b307300e6a42f6cb27b5652cbadc796ded8edd10
SHA256f3c060bf5cc8feb1693775678d4ccfe36223160f15343724e716df6524dd20e4
SHA5129344a3e6b6bbd2010268719c85d856c1246ae546d0c0ce6ba641e72bb6b522f9cc7026a4be5561c95994138aadfe26cc75e29897d224ec4d78e7678609f2dd1d
-
Filesize
8.2MB
MD5de42977e4084ee5fc9e83f969d43f154
SHA1cf42455de901d8164aaebe10a37fa19f18292485
SHA256f51fb50ad8b17265db2852f8b418f262aa34388a8699940ca37a2c3984e40959
SHA51288afacfde805a70993bbb29e295b9bdf2190384ebbcaf6948920f7a9c1b9fd15a986a24a54b2e209296b2e0e53032b4e1881bbc9215c1ff1385aabcaaf3ec1d3