Overview
overview
10Static
static
3547ef48f46...d.appx
windows7-x64
547ef48f46...d.appx
windows10-2004-x64
10ChromeSetup.exe
windows7-x64
6ChromeSetup.exe
windows10-2004-x64
6PsfLauncher32.exe
windows7-x64
1PsfLauncher32.exe
windows10-2004-x64
3PsfLauncher64.exe
windows7-x64
1PsfLauncher64.exe
windows10-2004-x64
1PsfRunDll32.exe
windows7-x64
1PsfRunDll32.exe
windows10-2004-x64
3PsfRunDll64.exe
windows7-x64
1PsfRunDll64.exe
windows10-2004-x64
1PsfRuntime32.dll
windows7-x64
3PsfRuntime32.dll
windows10-2004-x64
3PsfRuntime64.dll
windows7-x64
1PsfRuntime64.dll
windows10-2004-x64
1StartingSc...er.ps1
windows7-x64
3StartingSc...er.ps1
windows10-2004-x64
3VFS/Progra...13.exe
windows7-x64
3VFS/Progra...13.exe
windows10-2004-x64
3VFS/Progra...za.dll
windows7-x64
3VFS/Progra...za.dll
windows10-2004-x64
3VFS/Progra...xa.dll
windows7-x64
3VFS/Progra...xa.dll
windows10-2004-x64
3VFS/Progra...ar.dll
windows7-x64
3VFS/Progra...ar.dll
windows10-2004-x64
3VFS/Progra...64.dll
windows7-x64
1VFS/Progra...64.dll
windows10-2004-x64
1VFS/Progra...ar.dll
windows7-x64
1VFS/Progra...ar.dll
windows10-2004-x64
1VFS/Progra...za.dll
windows7-x64
1VFS/Progra...za.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 15:42
Static task
static1
Behavioral task
behavioral1
Sample
547ef48f46ecfe31ee7edc7bbff0c2406f43d11915bcef84372172873012eacd.appx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
547ef48f46ecfe31ee7edc7bbff0c2406f43d11915bcef84372172873012eacd.appx
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ChromeSetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ChromeSetup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
PsfLauncher32.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
PsfLauncher32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
PsfLauncher64.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
PsfLauncher64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
PsfRunDll32.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
PsfRunDll32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
PsfRunDll64.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
PsfRunDll64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
PsfRuntime32.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
PsfRuntime32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
PsfRuntime64.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
PsfRuntime64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
StartingScriptWrapper.ps1
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
StartingScriptWrapper.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
VFS/ProgramFilesX64/13/13.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
VFS/ProgramFilesX64/13/13.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
VFS/ProgramFilesX64/13/7za.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
VFS/ProgramFilesX64/13/7za.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
VFS/ProgramFilesX64/13/7zxa.dll
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
VFS/ProgramFilesX64/13/7zxa.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
VFS/ProgramFilesX64/13/Far/7-ZipFar.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
VFS/ProgramFilesX64/13/Far/7-ZipFar.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
VFS/ProgramFilesX64/13/Far/7-ZipFar64.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
VFS/ProgramFilesX64/13/Far/7-ZipFar64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
VFS/ProgramFilesX64/13/arm64/7-ZipFar.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
VFS/ProgramFilesX64/13/arm64/7-ZipFar.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
VFS/ProgramFilesX64/13/arm64/7za.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
VFS/ProgramFilesX64/13/arm64/7za.dll
Resource
win10v2004-20241007-en
General
-
Target
547ef48f46ecfe31ee7edc7bbff0c2406f43d11915bcef84372172873012eacd.appx
-
Size
15.0MB
-
MD5
6eaa4c8938016293d2153ccd78b473fc
-
SHA1
d044e629b6c0bafa9b312ab6c7f00cbcaa37b8a0
-
SHA256
547ef48f46ecfe31ee7edc7bbff0c2406f43d11915bcef84372172873012eacd
-
SHA512
74aa6933f80e5efd3bf4867a904d26f0f2211723a22eb5c467a1652c8808b0857e178022750bf6fa8027a9ab4060041c8c8334f632acfd0bdeeacbdce27c5cdc
-
SSDEEP
393216:WOUkApd7IlEhy+XkJ6fbyOOe8grIR2B2arSIHpYP:WOUkehIrJ6jbOe8gMm2aT2P
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 2 IoCs
pid Process 1272 7z2408.exe 3932 7z2408-x64.exe -
Loads dropped DLL 5 IoCs
pid Process 1272 7z2408.exe 1272 7z2408.exe 1272 7z2408.exe 1272 7z2408.exe 1272 7z2408.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\readme.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\7z.exe 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\License.txt 7z2408-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt 7z2408-x64.exe -
pid Process 3216 Powershell.exe 1696 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z2408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z2408-x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13.exe -
Modifies registry class 21 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2408-x64.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2408-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip 7z2408-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2408-x64.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 3 IoCs
pid Process 2504 13.exe 4644 13.exe 1632 13.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2200 powershell.exe 2200 powershell.exe 3216 Powershell.exe 3216 Powershell.exe 1696 powershell.exe 1696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2200 powershell.exe Token: SeDebugPrivilege 3216 Powershell.exe Token: SeDebugPrivilege 1696 powershell.exe Token: SeRestorePrivilege 2504 13.exe Token: 35 2504 13.exe Token: SeSecurityPrivilege 2504 13.exe Token: SeSecurityPrivilege 2504 13.exe Token: SeRestorePrivilege 4644 13.exe Token: 35 4644 13.exe Token: SeSecurityPrivilege 4644 13.exe Token: SeSecurityPrivilege 4644 13.exe Token: SeRestorePrivilege 1632 13.exe Token: 35 1632 13.exe Token: SeSecurityPrivilege 1632 13.exe Token: SeSecurityPrivilege 1632 13.exe Token: SeSecurityPrivilege 1272 7z2408.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1272 7z2408.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 3888 wrote to memory of 3532 3888 PsfLauncher64.exe 93 PID 3888 wrote to memory of 3532 3888 PsfLauncher64.exe 93 PID 3888 wrote to memory of 3532 3888 PsfLauncher64.exe 93 PID 3888 wrote to memory of 3532 3888 PsfLauncher64.exe 93 PID 3888 wrote to memory of 3532 3888 PsfLauncher64.exe 93 PID 3888 wrote to memory of 3532 3888 PsfLauncher64.exe 93 PID 3888 wrote to memory of 3532 3888 PsfLauncher64.exe 93 PID 3888 wrote to memory of 3532 3888 PsfLauncher64.exe 93 PID 3888 wrote to memory of 3532 3888 PsfLauncher64.exe 93 PID 3888 wrote to memory of 3532 3888 PsfLauncher64.exe 93 PID 3888 wrote to memory of 3532 3888 PsfLauncher64.exe 93 PID 3888 wrote to memory of 3532 3888 PsfLauncher64.exe 93 PID 3888 wrote to memory of 3216 3888 PsfLauncher64.exe 92 PID 3888 wrote to memory of 3216 3888 PsfLauncher64.exe 92 PID 3888 wrote to memory of 3216 3888 PsfLauncher64.exe 92 PID 3216 wrote to memory of 1696 3216 Powershell.exe 95 PID 3216 wrote to memory of 1696 3216 Powershell.exe 95 PID 3216 wrote to memory of 1696 3216 Powershell.exe 95 PID 1696 wrote to memory of 1368 1696 powershell.exe 96 PID 1696 wrote to memory of 1368 1696 powershell.exe 96 PID 1696 wrote to memory of 1368 1696 powershell.exe 96 PID 1368 wrote to memory of 2504 1368 cmd.exe 97 PID 1368 wrote to memory of 2504 1368 cmd.exe 97 PID 1368 wrote to memory of 2504 1368 cmd.exe 97 PID 1368 wrote to memory of 2504 1368 cmd.exe 97 PID 1368 wrote to memory of 2504 1368 cmd.exe 97 PID 1696 wrote to memory of 3756 1696 powershell.exe 98 PID 1696 wrote to memory of 3756 1696 powershell.exe 98 PID 1696 wrote to memory of 3756 1696 powershell.exe 98 PID 3756 wrote to memory of 4644 3756 cmd.exe 99 PID 3756 wrote to memory of 4644 3756 cmd.exe 99 PID 3756 wrote to memory of 4644 3756 cmd.exe 99 PID 3756 wrote to memory of 4644 3756 cmd.exe 99 PID 3756 wrote to memory of 4644 3756 cmd.exe 99 PID 1696 wrote to memory of 3352 1696 powershell.exe 100 PID 1696 wrote to memory of 3352 1696 powershell.exe 100 PID 1696 wrote to memory of 3352 1696 powershell.exe 100 PID 3352 wrote to memory of 1632 3352 cmd.exe 101 PID 3352 wrote to memory of 1632 3352 cmd.exe 101 PID 3352 wrote to memory of 1632 3352 cmd.exe 101 PID 3352 wrote to memory of 1632 3352 cmd.exe 101 PID 3352 wrote to memory of 1632 3352 cmd.exe 101 PID 1696 wrote to memory of 1272 1696 powershell.exe 102 PID 1696 wrote to memory of 1272 1696 powershell.exe 102 PID 1696 wrote to memory of 1272 1696 powershell.exe 102 PID 1696 wrote to memory of 1272 1696 powershell.exe 102 PID 1696 wrote to memory of 1272 1696 powershell.exe 102 PID 1696 wrote to memory of 3932 1696 powershell.exe 103 PID 1696 wrote to memory of 3932 1696 powershell.exe 103 PID 1696 wrote to memory of 3932 1696 powershell.exe 103 PID 1696 wrote to memory of 3932 1696 powershell.exe 103 PID 1696 wrote to memory of 3932 1696 powershell.exe 103
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start shell:AppsFolder\7-Zip_wxpajgjyvm7kj!NOTEPAD1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
C:\Program Files\WindowsApps\7-Zip_4.12.158.0_x64__wxpajgjyvm7kj\PsfLauncher64.exe"C:\Program Files\WindowsApps\7-Zip_4.12.158.0_x64__wxpajgjyvm7kj\PsfLauncher64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exePowershell.exe -ExecutionPolicy RemoteSigned -file "C:\Program Files\WindowsApps\7-Zip_4.12.158.0_x64__wxpajgjyvm7kj\StartingScriptWrapper.ps1" "Powershell.exe -ExecutionPolicy RemoteSigned -file '.\sofgnarfoj.ps1'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy RemoteSigned -file .\sofgnarfoj.ps13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "VFS\ProgramFilesX64\13\13.exe e VFS\ProgramFilesX64\7z24083.7z -oC:\Users\Public\7z2408 -p7z24083"4⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files\WindowsApps\7-Zip_4.12.158.0_x64__wxpajgjyvm7kj\VFS\ProgramFilesX64\13\13.exeVFS\ProgramFilesX64\13\13.exe e VFS\ProgramFilesX64\7z24083.7z -oC:\Users\Public\7z2408 -p7z240835⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "VFS\ProgramFilesX64\13\13.exe e C:\Users\Public\7z2408\7z24082.7z -oC:\Users\Public\7z2408 -p7z24082"4⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Program Files\WindowsApps\7-Zip_4.12.158.0_x64__wxpajgjyvm7kj\VFS\ProgramFilesX64\13\13.exeVFS\ProgramFilesX64\13\13.exe e C:\Users\Public\7z2408\7z24082.7z -oC:\Users\Public\7z2408 -p7z240825⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "VFS\ProgramFilesX64\13\13.exe e C:\Users\Public\7z2408\7z24081.7z -oC:\Users\Public\7z2408 -p7z24081"4⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Program Files\WindowsApps\7-Zip_4.12.158.0_x64__wxpajgjyvm7kj\VFS\ProgramFilesX64\13\13.exeVFS\ProgramFilesX64\13\13.exe e C:\Users\Public\7z2408\7z24081.7z -oC:\Users\Public\7z2408 -p7z240815⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
-
C:\Users\Public\7z2408\7z2408.exe"C:\Users\Public\7z2408\7z2408.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1272
-
-
C:\Users\Public\7z2408\7z2408-x64.exe"C:\Users\Public\7z2408\7z2408-x64.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3932
-
-
-
-
C:\Program Files\WindowsApps\7-Zip_4.12.158.0_x64__wxpajgjyvm7kj\VFS\ProgramFilesX64\PsfRunDll64.exe"PsfRunDll64.exe"2⤵PID:3532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD58194b8209bd7dff1a5ce02ced85e3cc2
SHA12c488b57d962181af78b08c5eeefd672d62b3ab0
SHA25633972e7a36c3fe16257646d8cfec6f7974eafd8e899250980456c91ad87f6f83
SHA51200f6d0ee7f268290d5139c825dbac2592bf9e7c2f30cf8b5769717dc582c50540f46406f8d54538b4aba93527e0257abeb2123749ff39c4d69a9ed3a492bb8ac
-
Filesize
1KB
MD563e62e02ee9c90b7adfb2eefe7efa04f
SHA19bc1eda86f7f95345c2a3901288b6867447dee6b
SHA256cbafbcef08446541d49da9d11842ab860628a7d317db15f570b7b1e1048ade11
SHA5123d2bf16c2a9b42e28dc9d2c18d6d697d3749b14f2f6c708ea9e587022aeb5fbbcffaa49c4f4f994f1cd1f6c886b8d8b6ab3a29d3b65fe0659ea0f2fa9d47ba52
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.5MB
MD50330d0bd7341a9afe5b6d161b1ff4aa1
SHA186918e72f2e43c9c664c246e62b41452d662fbf3
SHA25667cb9d3452c9dd974b04f4a5fd842dbcba8184f2344ff72e3662d7cdb68b099b
SHA512850382414d9d33eab134f8bd89dc99759f8d0459b7ad48bd9588405a3705aeb2cd727898529e3f71d9776a42e141c717e844e0b5c358818bbeac01d096907ad1
-
Filesize
54KB
MD5e7629e75a194c681b1bc19cce7d320ce
SHA1c7376ce541fb66026bb1b1978966adbe17640cbf
SHA25609456b07402683123588328d32f1a8e40a06b36478f30b8412bc9b38c110330b
SHA51222b1845561a7695df10aa4fa720aa94968237d2459a980b100612cce8884bf184f4f38dde8fe0047e617b3b536b554569b105bbe35ecf778c40af7953e7cca8f
-
Filesize
3.0MB
MD505b06612114f626daf65ece5e5d3d047
SHA1f23ef8087700e45d5746d61a2a2d1cfc53faf2c3
SHA2568a1a15a1f014f3f08b18d43b593443462f9e6ab4d7167df1610eec81d86152ee
SHA5122b6f60670e1177bd4c5bb618d33ec6cd3c856df824e0810ff680df41110d584e83d8ebd40a8fa6be5825d7324e81e9293313db3a5ed81b22ead9acd5fd9d9279
-
Filesize
3.0MB
MD579e255e588742b10ec9348b9a8205bc6
SHA156f73225fd7c9c6bdf7bc7f02c4355af649f6f5d
SHA256c0db8858788980ae13768924ca33392200c0333688ddaec4064b9ed9b9c597b3
SHA512ddb19b862b9cb70965be97df99ad698e9e29bbaeacb22d32183c6e84630f586952799264b8194c0475f03874fa076fb64eee890dcc1499b098d60382b6f782ce
-
Filesize
320KB
MD52d3b207c8a48148296156e5725426c7f
SHA1ad464eb7cf5c19c8a443ab5b590440b32dbc618f
SHA256edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796
SHA51255c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c
-
Filesize
2KB
MD5c3acb1af45f26f321b16254a1150e5cc
SHA149267c214c8fafed1570a61b4aafb5b2a02fba6a
SHA2566f22d4f19fd1bd72005354747065f6be2282983481def538cdede31df6bebdea
SHA51297520c355b4b68bbe96606debd9fcb6fb13ecddcd35e6281c34175e4c582111c3f23bf16d27945a5f436a4a99472838de643b700ffb0f45cbeda45fe158436f3
-
Filesize
3.5MB
MD5ad51946b1659ed61b76ff4e599e36683
SHA1dfe2439424886e8acf9fa3ffde6caaf7bfdd583e
SHA25607a191254362664b3993479a277199f7ea5ee723b6c25803914eedb50250acf4
SHA5126c30e7793f69508f6d9aa6edcec6930ba361628ef597e32c218e15d80586f5a86d89fcbee63a35eab7b1e0ae26277512f4c1a03df7912f9b7ff9a9a858cf3962
-
Filesize
641B
MD5070e44bb65445b9811e938a52818736e
SHA144d64648d74882537cd7fefe0f548fa65045a386
SHA25612b8cbfdc4e9fbd81b889fe28e1064745e9940ce6068b460c225b1bef3d9c818
SHA512a4abd44501f3488ef8015feac37642ac64ee7d10f078a5cde9ce68ca7833377472a6defac5325960d01d97cc02f577fec2983b4b4bedbb7f0fd807474a782a74
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
32KB
MD5dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166
-
Filesize
18KB
MD5a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd