Analysis
-
max time kernel
808s -
max time network
809s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 11:41
Static task
static1
URLScan task
urlscan1
Errors
General
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023d3f-238.dat mimikatz -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
NotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation NotPetya.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation NotPetya.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation NotPetya.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation NotPetya.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation NotPetya.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation NotPetya.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation NotPetya.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation NotPetya.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation NotPetya.exe -
Executes dropped EXE 11 IoCs
Processes:
NotPetya.exe123B.tmpNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exePetya.A.exepid Process 5760 NotPetya.exe 6016 123B.tmp 868 NotPetya.exe 2004 NotPetya.exe 4296 NotPetya.exe 5500 NotPetya.exe 5396 NotPetya.exe 2560 NotPetya.exe 5696 NotPetya.exe 5764 NotPetya.exe 4496 Petya.A.exe -
Loads dropped DLL 9 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid Process 5920 rundll32.exe 2508 rundll32.exe 5236 rundll32.exe 5492 rundll32.exe 644 rundll32.exe 3840 rundll32.exe 1880 rundll32.exe 5660 rundll32.exe 6012 rundll32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 56 raw.githubusercontent.com 57 raw.githubusercontent.com 957 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exePetya.A.exedescription ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe File opened for modification \??\PhysicalDrive0 Petya.A.exe -
Drops file in Program Files directory 55 IoCs
Processes:
rundll32.exedescription ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\ENUtxt.pdf rundll32.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPP.VBS rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileAcrobatCard_Dark.pdf rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\javafx-src.zip rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\HomeBanner_Dark.pdf rundll32.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrome.7z rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\Adobe Cloud Services.pdf rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SAMPLES\SOLVSAMP.XLS rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileScanCard_Dark.pdf rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgeCalls.h rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\PDFSigQFormalRep.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileAcrobatCard_Light.pdf rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\SHELLNEW\EXCEL12.XLSX rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Click on 'Change' to select default PDF handler.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf rundll32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Archive.zip rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\DefaultID.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\Words.pdf rundll32.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\ffjcext.zip rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.XLS rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\16\BIN\1033\FPEXT.MSG rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\classfile_constants.h rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.XLS rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\jawt_md.h rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jni.h rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\amd64\jvm.cfg rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\Adobe Acrobat Pro DC.pdf rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jdwpTransport.h rundll32.exe File opened for modification C:\Program Files\UnprotectConfirm.rar rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\Complex Machine.pdf rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\jni_md.h rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.PPT rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\HomeBanner_Light.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\Bus Schedule.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\java.settings.cfg rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgePackages.h rundll32.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\amd64\jvm.cfg rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgeCallbacks.h rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\AdobeID.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileScanCard_Light.pdf rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jvmti.h rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jvmticmlr.h rundll32.exe File opened for modification C:\Program Files\MergeClose.dwg rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jawt.h rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.cfg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Welcome.pdf rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\ffjcext.zip rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.PPT rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\Adobe Sign White Paper.pdf rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgeCalls.c rundll32.exe -
Drops file in Windows directory 20 IoCs
Processes:
rundll32.exeNotPetya.exerundll32.exerundll32.exeNotPetya.exerundll32.exeNotPetya.exeNotPetya.exerundll32.exeNotPetya.exerundll32.exerundll32.exeNotPetya.exerundll32.exeNotPetya.exeNotPetya.exeNotPetya.exerundll32.exedescription ioc Process File opened for modification C:\Windows\perfc.dat rundll32.exe File created C:\Windows\perfc.dat NotPetya.exe File opened for modification C:\Windows\perfc.dat rundll32.exe File opened for modification C:\Windows\perfc.dat rundll32.exe File created C:\Windows\perfc.dat NotPetya.exe File opened for modification C:\Windows\perfc.dat rundll32.exe File created C:\Windows\perfc.dat NotPetya.exe File created C:\Windows\perfc.dat NotPetya.exe File opened for modification C:\Windows\perfc.dat rundll32.exe File created C:\Windows\perfc.dat NotPetya.exe File created C:\Windows\perfc rundll32.exe File opened for modification C:\Windows\perfc.dat rundll32.exe File created C:\Windows\perfc.dat NotPetya.exe File opened for modification C:\Windows\perfc.dat rundll32.exe File created C:\Windows\perfc.dat NotPetya.exe File opened for modification C:\Windows\perfc.dat rundll32.exe File created C:\Windows\dllhost.dat rundll32.exe File created C:\Windows\perfc.dat NotPetya.exe File created C:\Windows\perfc.dat NotPetya.exe File opened for modification C:\Windows\perfc.dat rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
NotPetya.exerundll32.exerundll32.exePetya.A.exerundll32.execmd.exeNotPetya.exerundll32.exeNotPetya.exeNotPetya.exerundll32.exeNotPetya.exerundll32.exeNotPetya.exerundll32.exeNotPetya.exeNotPetya.exeschtasks.exeNotPetya.exerundll32.exerundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotPetya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Petya.A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotPetya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotPetya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotPetya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotPetya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotPetya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotPetya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotPetya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotPetya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings msedge.exe -
NTFS ADS 2 IoCs
Processes:
msedge.exedescription ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 538785.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 806390.crdownload:SmartScreen msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 39 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exerundll32.exe123B.tmprundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exemsedge.exemsedge.exepid Process 1164 msedge.exe 1164 msedge.exe 4244 msedge.exe 4244 msedge.exe 5016 identity_helper.exe 5016 identity_helper.exe 5468 msedge.exe 5468 msedge.exe 5920 rundll32.exe 5920 rundll32.exe 6016 123B.tmp 6016 123B.tmp 6016 123B.tmp 6016 123B.tmp 6016 123B.tmp 6016 123B.tmp 6016 123B.tmp 2508 rundll32.exe 2508 rundll32.exe 5236 rundll32.exe 5236 rundll32.exe 5492 rundll32.exe 5492 rundll32.exe 644 rundll32.exe 644 rundll32.exe 3840 rundll32.exe 3840 rundll32.exe 1880 rundll32.exe 1880 rundll32.exe 5660 rundll32.exe 5660 rundll32.exe 6012 rundll32.exe 6012 rundll32.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 4204 msedge.exe 4204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
rundll32.exe123B.tmprundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exePetya.A.exedescription pid Process Token: SeShutdownPrivilege 5920 rundll32.exe Token: SeDebugPrivilege 5920 rundll32.exe Token: SeTcbPrivilege 5920 rundll32.exe Token: SeDebugPrivilege 6016 123B.tmp Token: SeShutdownPrivilege 2508 rundll32.exe Token: SeDebugPrivilege 2508 rundll32.exe Token: SeTcbPrivilege 2508 rundll32.exe Token: SeShutdownPrivilege 5236 rundll32.exe Token: SeDebugPrivilege 5236 rundll32.exe Token: SeTcbPrivilege 5236 rundll32.exe Token: SeShutdownPrivilege 5492 rundll32.exe Token: SeDebugPrivilege 5492 rundll32.exe Token: SeTcbPrivilege 5492 rundll32.exe Token: SeShutdownPrivilege 644 rundll32.exe Token: SeDebugPrivilege 644 rundll32.exe Token: SeTcbPrivilege 644 rundll32.exe Token: SeShutdownPrivilege 3840 rundll32.exe Token: SeDebugPrivilege 3840 rundll32.exe Token: SeTcbPrivilege 3840 rundll32.exe Token: SeShutdownPrivilege 1880 rundll32.exe Token: SeDebugPrivilege 1880 rundll32.exe Token: SeTcbPrivilege 1880 rundll32.exe Token: SeShutdownPrivilege 5660 rundll32.exe Token: SeDebugPrivilege 5660 rundll32.exe Token: SeTcbPrivilege 5660 rundll32.exe Token: SeShutdownPrivilege 6012 rundll32.exe Token: SeDebugPrivilege 6012 rundll32.exe Token: SeTcbPrivilege 6012 rundll32.exe Token: SeShutdownPrivilege 4496 Petya.A.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
Processes:
msedge.exepid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of SendNotifyMessage 40 IoCs
Processes:
msedge.exepid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
NotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exeNotPetya.exePetya.A.exepid Process 5760 NotPetya.exe 868 NotPetya.exe 2004 NotPetya.exe 4296 NotPetya.exe 5500 NotPetya.exe 5396 NotPetya.exe 2560 NotPetya.exe 5696 NotPetya.exe 5764 NotPetya.exe 4496 Petya.A.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid Process procid_target PID 4244 wrote to memory of 3328 4244 msedge.exe 85 PID 4244 wrote to memory of 3328 4244 msedge.exe 85 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 2388 4244 msedge.exe 86 PID 4244 wrote to memory of 1164 4244 msedge.exe 87 PID 4244 wrote to memory of 1164 4244 msedge.exe 87 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88 PID 4244 wrote to memory of 1532 4244 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Ransomware/NotPetya.exe1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f81e46f8,0x7ff8f81e4708,0x7ff8f81e47182⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4128 /prefetch:82⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3336 /prefetch:82⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6284 /prefetch:82⤵PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6400 /prefetch:12⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6432 /prefetch:12⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4996 /prefetch:82⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2144,13939315988970516997,16441787257263115272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Users\Admin\Downloads\Petya.A.exe"C:\Users\Admin\Downloads\Petya.A.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2228
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5580
-
C:\Users\Admin\Downloads\NotPetya.exe"C:\Users\Admin\Downloads\NotPetya.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5760 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #12⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5920 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN "" /TR "C:\Windows\system32\shutdown.exe /r /f" /ST 12:443⤵
- System Location Discovery: System Language Discovery
PID:5980 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN "" /TR "C:\Windows\system32\shutdown.exe /r /f" /ST 12:444⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6140
-
-
-
C:\Users\Admin\AppData\Local\Temp\123B.tmp"C:\Users\Admin\AppData\Local\Temp\123B.tmp" \\.\pipe\{67905496-378E-45D1-901E-FE902D68CBAB}3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6016
-
-
-
C:\Users\Admin\Desktop\NotPetya.exe"C:\Users\Admin\Desktop\NotPetya.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:868 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #12⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Users\Admin\Desktop\NotPetya.exe"C:\Users\Admin\Desktop\NotPetya.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #12⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5236
-
-
C:\Users\Admin\Desktop\NotPetya.exe"C:\Users\Admin\Desktop\NotPetya.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4296 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #12⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5492
-
-
C:\Users\Admin\Desktop\NotPetya.exe"C:\Users\Admin\Desktop\NotPetya.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5500 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #12⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Users\Admin\Desktop\NotPetya.exe"C:\Users\Admin\Desktop\NotPetya.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5396 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #12⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
C:\Users\Admin\Desktop\NotPetya.exe"C:\Users\Admin\Desktop\NotPetya.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #12⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Users\Admin\Desktop\NotPetya.exe"C:\Users\Admin\Desktop\NotPetya.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5696 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #12⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5660
-
-
C:\Users\Admin\Desktop\NotPetya.exe"C:\Users\Admin\Desktop\NotPetya.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5764 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #12⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6012
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5d3546bb5027a72805dd9324cd9965080
SHA198c6cbb584d2ec49fec2a36254424522e7218c15
SHA25631aac81228f05273b568ce9b9b6095e2baf309d5c2539d7db6a5a25b0859d1e0
SHA5129e6c13c137e24bf542bfa74c168fe2d2d349a2fb6a422f33226957351de81b80e0f130d4b24e5f6ad974fe66bb5546ede5580cd5ed684a442eabeacb2c413946
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1efabb05-6c06-4117-adf0-e90cb251f3e5.tmp
Filesize6KB
MD5cad7c8dc74d9b3607dfd7c65c3a7d826
SHA1c4789465504a5bf429eb7f7cf34fcc5263503dbf
SHA2565b52b5eeb65dae6f0c4f461ab188b8996423fa649a815b208645d261638fe1d4
SHA5125de5be9caf3c76d93c34778c52e910e80f479dc793b7548119bf7778df446ab3213623c1c869e369ed08e8b7ef9abb2dcf479c913724d39cfeea1d45b0fcfe3b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD56d00a3042a9a7040cd6b55a033fb8cfb
SHA11eafdcf9f859123a1ff0dda85b5727502eab64ca
SHA256a10194f67ad8d3c604e8ee9a5f6754538b5337fce950ff324060996095b4e53c
SHA512b1e45981560638a48a015595ba765774ee187e9664b74511e70ec06c334e541af3e7be87a44ad25118ea31df5ab3ffc31569e1bd3c2a43c1d4e2b036cf942262
-
Filesize
579B
MD576ce25dd0003895d216aec011fd48815
SHA182b7e4be21ebef67d9fe1b9b8025961da5a45f9a
SHA256c0098c46f84c08915e00ce0dba99fc5c119a8b277d1525335207466a7ce2f9bb
SHA5127926cd52bd8cb212c621ebee307fb85584c8f3b565daca95eaef7c8620b68d567334ab8da6b041ff975183fb984d73a84a5f0ae2b7a51c2a60a58a38cdb45f3b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5a3d07c24df02a7182f1cf025781a8777
SHA1eeffea7d60bf7e5952fdb325dc261a809c889ba5
SHA256bfb420d09570b61cc24dc0b4b755498524c6c3c2b475135fd197be2a7956139c
SHA51285e8d1d80f96f1b9aab814580974d1fa74dd627d6bc5fe94007a7072c22f4106868cbe9b84c051facc1a5e2d0e1e26ac47b3a179a8e0d3c850ee40e245534d9d
-
Filesize
5KB
MD5e22071a9da81f9f00ff049c37853d774
SHA17e5e9e3daaa6c3e753d74b04b8c872ffaa5863be
SHA2564f3ea4e584f2af67b12c6e894902bd1a4079c025b70fb0676fabcfb5da96edd5
SHA512f461356a025512d2a34c26d92a06d331ac76adbd08ca111d5e324abe5eab27968ca6cc78a723283655a49dfa31087f22fca68dd930991193194497ebe5a53460
-
Filesize
6KB
MD59028a28493d3ea6668c3101274511a88
SHA1d6590f35eb98fb4a400a3332e5587a4170de1f38
SHA2561d2c23bfef088db9b295e6bb7c5fcd50694af7c439c882ff0aa5adc3a7eeb05d
SHA5125c05157852e729b71e9b6b6f57597d5797e08ac6db9a0a70f23616c34c429d8cac37ae1c6ebe4fc07c3ef9e7b7f723a1f1019b24b964b9b5147bf59b38e621e3
-
Filesize
6KB
MD5248f413824be500be8a556f4d4c8a08f
SHA1ea47e027c202d540c9a659b6ab5596fc85079b6e
SHA25695d526341771740bf8ad5877bba513741a2d82c403060c570994c8c59027c03d
SHA51259af528d5806b507334563c66f9f089f5f3fdf75c8298dd164ce3fe236448cef72d6d4f4543137697ae24658ebcb9f52971dff95660ff18ce87f974093aefdd5
-
Filesize
1KB
MD5a573ef14b46d8be9f1c7742c7355deef
SHA11eb24f6108e015d090aa4a0b84fc7d00495ca75c
SHA256bb12d2f86d9768d477ea0103a1b25162456e79405241c40cb8e13c506e18dc58
SHA512303d19c660d38f5e33f73933cad0716fe30e7483faa3ac273f72e41fa8229ae78e50346ac0c04c0bc22cd5e06f29e1cb2b71ce707ba6735cd5a5378beda38ab3
-
Filesize
1KB
MD5f7634114355295d1ec76ed391957bbb5
SHA1cdd2b44776623818c6b5966d35acde6eb9a18029
SHA2569092f747e71e2560a109fc16564697d77b6f15260e8be1f663c116724103a620
SHA5128e1d8ad64333c7a117b74f6df322756c50665dd6e0ddb1230cdabec54a97b2b05d1d53ea1a5cc549847e86d08029fd5bd7366aa4199d447e56e593fe6a615cf9
-
Filesize
1KB
MD550edac0df43a4814a1fa46f3c152afea
SHA106710246deb8cb5b354ef6d59869b9588672646e
SHA256053c62e52f58264465a62f629f19bfe8220a46673b06893117796bcae99f0e02
SHA512cf69482a3fdfbe3873f20d0d8049548ba313d615c2c6e43e2172a2aaeee62b0f710ddad875aa46f3f8da34adc63d4612fc28d2a6b337aaa0ed8e96047e484961
-
Filesize
1KB
MD5a4f868535089859770ffc3d50122a5a6
SHA13be2fe28c76ef938e4115b3c6eff077fad2af957
SHA256101bb18916cfd4b26edf6519a7c54b4bd90623abbcaa06e1bca6cd98ee5ac371
SHA51234586147f43bb04270ade459976b67d5f7190a0df666ff1061abd93f276fa204aad01f2a01bf9c6e4228c208805f71b106a2989a36fa2a8330ffed3e70bc8a1f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD52e990f0f0bdc30833eb3102f8226f197
SHA168a0e8e9faf6916d0ae23f12326bdac0c3cc6b50
SHA256d1e78bfd4f0dc3df434a121dd0a360548395a5c7c22b2d85dcd9923ee145458c
SHA5122f97e59f5667a287562eaad5c322539205dbbd3ef9c79946a52d4acaa91fc51eb82e605f0cb238e6a4c6e61f7e550dfb3f9e7bec770ef6b5338ac3fd8a38fcee
-
Filesize
11KB
MD575ed1cf4a305ac718f58dd0ad9c70e85
SHA131f81dc46003535bb562d8a04a2518541ae744f7
SHA2569213fd46ce4cf2134d25aea30dd51b6182154430f46107613420f19a2de4de72
SHA5120eef0193b8ed3007221f5cdd49f7d55ab5f2a6ce5b0abc76ba300d36af17010c1facef5e6c8a0c17787e158f2fd11c5fa714361787b5ed01334cb94ecb130e6e
-
Filesize
55KB
MD57e37ab34ecdcc3e77e24522ddfd4852d
SHA138e2855e11e353cedf9a8a4f2f2747f1c5c07fcf
SHA25602ef73bd2458627ed7b397ec26ee2de2e92c71a0e7588f78734761d8edbdcd9f
SHA5121b037a2aa8bf951d2ffe2f724aa0b2fbb39c2173215806ba0327bda7b096301d887f9bb7db46f9e04584b16aa6b1aaeaf67f0ecf5f20eb02ceac27c8753ca587
-
Filesize
390KB
MD55b7e6e352bacc93f7b80bc968b6ea493
SHA1e686139d5ed8528117ba6ca68fe415e4fb02f2be
SHA25663545fa195488ff51955f09833332b9660d18f8afb16bdf579134661962e548a
SHA5129d24af0cb00fb8a5e61e9d19cd603b5541a22ae6229c2acf498447e0e7d4145fee25c8ab9d5d5f18f554e6cbf8ca56b7ca3144e726d7dfd64076a42a25b3dfb6
-
Filesize
225KB
MD5af2379cc4d607a45ac44d62135fb7015
SHA139b6d40906c7f7f080e6befa93324dddadcbd9fa
SHA25626b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739
SHA51269899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99
-
Filesize
353KB
MD587e48f32628f23eee59ed36b93735293
SHA1d9f9a61b4ac96ede4c9e719f475321a160a00bed
SHA2561799b513968e260d524305c64ef65a6390ce4592972a95711aa10f8923786619
SHA5122440643ca3dee4e1dffb5d6355481bafffc843959712115d6c8eb7a3d692782eb55253df028fc904aef4b409fcfc59b9d2b8a9262f85b93c4adb124d1bff6188
-
Filesize
353KB
MD59a7ffe65e0912f9379ba6e8e0b079fde
SHA1532bea84179e2336caed26e31805ceaa7eec53dd
SHA2564b336c3cc9b6c691fe581077e3dd9ea7df3bf48f79e35b05cf87e079ec8e0651
SHA512e8ebf30488b9475529d3345a00c002fe44336718af8bc99879018982bbc1172fc77f9fee12c541bab9665690092709ef5f847b40201782732c717c331bb77c31
-
Filesize
353KB
MD571b6a493388e7d0b40c83ce903bc6b04
SHA134f917aaba5684fbe56d3c57d48ef2a1aa7cf06d
SHA256027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745
SHA512072205eca5099d9269f358fe534b370ff21a4f12d7938d6d2e2713f69310f0698e53b8aff062849f0b2a521f68bee097c1840993825d2a5a3aa8cf4145911c6f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e