Overview
overview
10Static
static
31.rar
windows7-x64
71.rar
windows10-2004-x64
10oj3.exe
windows7-x64
10oj3.exe
windows10-2004-x64
10Config.ini
windows7-x64
1Config.ini
windows10-2004-x64
1interception.dll
windows7-x64
1interception.dll
windows10-2004-x64
1libcrypto-3-x64.dll
windows7-x64
1libcrypto-3-x64.dll
windows10-2004-x64
1onnxruntime.dll
windows7-x64
1onnxruntime.dll
windows10-2004-x64
1opencv_world490.dll
windows7-x64
1opencv_world490.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
1.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
0oj3.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
0oj3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Config.ini
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Config.ini
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
interception.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
interception.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
libcrypto-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
libcrypto-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
onnxruntime.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
onnxruntime.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
opencv_world490.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
opencv_world490.dll
Resource
win10v2004-20241007-en
General
-
Target
0oj3.exe
-
Size
37.0MB
-
MD5
d57050cc8f1d71bb068a181301146855
-
SHA1
564deb2344ea43dd519ee0000642cb0ced55da83
-
SHA256
08058004805b7054e6dd6c55e1aebfa356cddd46167aae7de4322d4c3ae79db1
-
SHA512
43af8130465347d06e23838bc652a94b8d06518d81c40f32f87d78d87a485ae23b13d7585f3e05f0231b9f6f59e383b98617b268519d1c6742b7309c1da494e4
-
SSDEEP
786432:b/gO+cE2+qOnY9ZBLcf5jJGlbarkt0PAmyrL+rXrO37:bEcEGbLwjubcktYbO37
Malware Config
Extracted
asyncrat
0.6.1
service
193.57.137.78:5555
Q8ghiNEV5vpA
-
delay
3
-
install
true
-
install_file
cmd.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Creates new service(s) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 62 IoCs
pid Process 2700 cmd.exe 2452 svchost.exe 3052 cmd.exe 3736 RuntimeBroker.exe 2156 svchost.exe 1548 svchost.exe 5092 svchost.exe 1144 svchost.exe 1344 OfficeClickToRun.exe 1540 svchost.exe 948 svchost.exe 1932 svchost.exe 3700 svchost.exe 1728 svchost.exe 1924 svchost.exe 2904 svchost.exe 2508 SppExtComObj.exe 1324 svchost.exe 3468 svchost.exe 2104 spoolsv.exe 1312 svchost.exe 2492 unsecapp.exe 1112 svchost.exe 2292 svchost.exe 1696 svchost.exe 1104 svchost.exe 3664 svchost.exe 508 svchost.exe 900 svchost.exe 1668 svchost.exe 4324 TextInputHost.exe 4028 RuntimeBroker.exe 2720 svchost.exe 1268 svchost.exe 1640 svchost.exe 1660 svchost.exe 2444 svchost.exe 1048 svchost.exe 660 lsass.exe 1840 svchost.exe 2824 svchost.exe 64 dwm.exe 2624 svchost.exe 2816 svchost.exe 2616 sihost.exe 1432 svchost.exe 4380 RuntimeBroker.exe 3588 Explorer.EXE 1420 svchost.exe 1776 svchost.exe 2796 sysmon.exe 2200 svchost.exe 792 svchost.exe 3968 StartMenuExperienceHost.exe 1012 svchost.exe 612 winlogon.exe 2776 taskhostw.exe 1196 svchost.exe 2768 svchost.exe 2372 svchost.exe 4736 svchost.exe 988 svchost.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe -
Loads dropped DLL 9 IoCs
pid Process 5116 svchost.exe 1664 Conhost.exe 1748 svchost.exe 2888 TrustedInstaller.exe 1120 svchost.exe 1452 wmiprvse.exe 1960 mousocoreworker.exe 1652 svchost.exe 4496 TiWorker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Users\\Admin\\AppData\\Roaming\\cmd.exe\"" cmd.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 OfficeClickToRun.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work svchost.exe File created C:\Windows\system32\ASChelp.dll cmd.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 OfficeClickToRun.exe File created C:\Windows\system32\ASChelp.dll cmd.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3608 0oj3.exe 3608 0oj3.exe 3712 cmd.exe 3712 cmd.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\cmd.exe cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\cmd.exe cmd.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 456 sc.exe 4780 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName wmiprvse.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mousocoreworker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU mousocoreworker.exe -
Modifies data under HKEY_USERS 23 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\SignalManager mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\SignalManager\Peek mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "0018C010A008A2DE" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1735506882" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Sun, 29 Dec 2024 21:14:45 GMT" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={135192FF-D805-4E0D-B55C-F69E80226519}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\SignalManager\Peek\CacheStore mousocoreworker.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1 svchost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133799804213091231" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133799804214810024" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy svchost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4900 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3608 0oj3.exe 3608 0oj3.exe 3712 cmd.exe 3712 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe 2700 cmd.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 3608 0oj3.exe 3712 cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2700 cmd.exe Token: SeDebugPrivilege 2700 cmd.exe Token: SeAssignPrimaryTokenPrivilege 1668 svchost.exe Token: SeIncreaseQuotaPrivilege 1668 svchost.exe Token: SeSecurityPrivilege 1668 svchost.exe Token: SeTakeOwnershipPrivilege 1668 svchost.exe Token: SeLoadDriverPrivilege 1668 svchost.exe Token: SeSystemtimePrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeRestorePrivilege 1668 svchost.exe Token: SeShutdownPrivilege 1668 svchost.exe Token: SeSystemEnvironmentPrivilege 1668 svchost.exe Token: SeUndockPrivilege 1668 svchost.exe Token: SeManageVolumePrivilege 1668 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1668 svchost.exe Token: SeIncreaseQuotaPrivilege 1668 svchost.exe Token: SeSecurityPrivilege 1668 svchost.exe Token: SeTakeOwnershipPrivilege 1668 svchost.exe Token: SeLoadDriverPrivilege 1668 svchost.exe Token: SeSystemtimePrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeRestorePrivilege 1668 svchost.exe Token: SeShutdownPrivilege 1668 svchost.exe Token: SeSystemEnvironmentPrivilege 1668 svchost.exe Token: SeUndockPrivilege 1668 svchost.exe Token: SeManageVolumePrivilege 1668 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1668 svchost.exe Token: SeIncreaseQuotaPrivilege 1668 svchost.exe Token: SeSecurityPrivilege 1668 svchost.exe Token: SeTakeOwnershipPrivilege 1668 svchost.exe Token: SeLoadDriverPrivilege 1668 svchost.exe Token: SeSystemtimePrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeRestorePrivilege 1668 svchost.exe Token: SeShutdownPrivilege 1668 svchost.exe Token: SeSystemEnvironmentPrivilege 1668 svchost.exe Token: SeUndockPrivilege 1668 svchost.exe Token: SeManageVolumePrivilege 1668 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1668 svchost.exe Token: SeIncreaseQuotaPrivilege 1668 svchost.exe Token: SeSecurityPrivilege 1668 svchost.exe Token: SeTakeOwnershipPrivilege 1668 svchost.exe Token: SeLoadDriverPrivilege 1668 svchost.exe Token: SeSystemtimePrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeRestorePrivilege 1668 svchost.exe Token: SeShutdownPrivilege 1668 svchost.exe Token: SeSystemEnvironmentPrivilege 1668 svchost.exe Token: SeUndockPrivilege 1668 svchost.exe Token: SeManageVolumePrivilege 1668 svchost.exe Token: SeShutdownPrivilege 1960 mousocoreworker.exe Token: SeCreatePagefilePrivilege 1960 mousocoreworker.exe Token: SeAuditPrivilege 2768 svchost.exe Token: SeShutdownPrivilege 4028 RuntimeBroker.exe Token: SeAssignPrimaryTokenPrivilege 1668 svchost.exe Token: SeIncreaseQuotaPrivilege 1668 svchost.exe Token: SeSecurityPrivilege 1668 svchost.exe Token: SeTakeOwnershipPrivilege 1668 svchost.exe Token: SeLoadDriverPrivilege 1668 svchost.exe Token: SeSystemtimePrivilege 1668 svchost.exe Token: SeBackupPrivilege 1668 svchost.exe Token: SeRestorePrivilege 1668 svchost.exe Token: SeShutdownPrivilege 1668 svchost.exe Token: SeSystemEnvironmentPrivilege 1668 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3608 wrote to memory of 3712 3608 0oj3.exe 83 PID 3608 wrote to memory of 3712 3608 0oj3.exe 83 PID 3712 wrote to memory of 2700 3712 cmd.exe 90 PID 3712 wrote to memory of 2700 3712 cmd.exe 90 PID 2700 wrote to memory of 3480 2700 cmd.exe 93 PID 2700 wrote to memory of 3480 2700 cmd.exe 93 PID 3480 wrote to memory of 4900 3480 cmd.exe 95 PID 3480 wrote to memory of 4900 3480 cmd.exe 95 PID 2700 wrote to memory of 4780 2700 cmd.exe 96 PID 2700 wrote to memory of 4780 2700 cmd.exe 96 PID 2700 wrote to memory of 456 2700 cmd.exe 98 PID 2700 wrote to memory of 456 2700 cmd.exe 98 PID 2700 wrote to memory of 2452 2700 cmd.exe 43 PID 2700 wrote to memory of 5116 2700 cmd.exe 65 PID 2700 wrote to memory of 3736 2700 cmd.exe 62 PID 2700 wrote to memory of 780 2700 cmd.exe 9 PID 2700 wrote to memory of 2156 2700 cmd.exe 39 PID 2700 wrote to memory of 776 2700 cmd.exe 8 PID 2700 wrote to memory of 1664 2700 cmd.exe 85 PID 2700 wrote to memory of 1748 2700 cmd.exe 86 PID 2700 wrote to memory of 2888 2700 cmd.exe 91 PID 2700 wrote to memory of 1548 2700 cmd.exe 27 PID 2700 wrote to memory of 5092 2700 cmd.exe 68 PID 2700 wrote to memory of 1144 2700 cmd.exe 20 PID 2700 wrote to memory of 1344 2700 cmd.exe 72 PID 2700 wrote to memory of 1540 2700 cmd.exe 26 PID 2700 wrote to memory of 948 2700 cmd.exe 12 PID 2700 wrote to memory of 1932 2700 cmd.exe 34 PID 2700 wrote to memory of 3700 2700 cmd.exe 57 PID 2700 wrote to memory of 1728 2700 cmd.exe 30 PID 2700 wrote to memory of 1924 2700 cmd.exe 33 PID 2700 wrote to memory of 2904 2700 cmd.exe 52 PID 2700 wrote to memory of 2508 2700 cmd.exe 70 PID 2700 wrote to memory of 2704 2700 cmd.exe 73 PID 2700 wrote to memory of 1324 2700 cmd.exe 23 PID 2700 wrote to memory of 3880 2700 cmd.exe 58 PID 2700 wrote to memory of 3468 2700 cmd.exe 55 PID 2700 wrote to memory of 1120 2700 cmd.exe 19 PID 2700 wrote to memory of 2104 2700 cmd.exe 38 PID 2700 wrote to memory of 1312 2700 cmd.exe 22 PID 2700 wrote to memory of 2492 2700 cmd.exe 53 PID 2700 wrote to memory of 1112 2700 cmd.exe 18 PID 2700 wrote to memory of 2292 2700 cmd.exe 41 PID 2700 wrote to memory of 1696 2700 cmd.exe 29 PID 2700 wrote to memory of 1104 2700 cmd.exe 17 PID 2700 wrote to memory of 3664 2700 cmd.exe 71 PID 2700 wrote to memory of 508 2700 cmd.exe 14 PID 2700 wrote to memory of 900 2700 cmd.exe 11 PID 2700 wrote to memory of 1668 2700 cmd.exe 37 PID 2700 wrote to memory of 4324 2700 cmd.exe 74 PID 2700 wrote to memory of 1280 2700 cmd.exe 84 PID 2700 wrote to memory of 4028 2700 cmd.exe 60 PID 2700 wrote to memory of 2720 2700 cmd.exe 46 PID 2700 wrote to memory of 1268 2700 cmd.exe 21 PID 2700 wrote to memory of 1640 2700 cmd.exe 28 PID 2700 wrote to memory of 1660 2700 cmd.exe 36 PID 2700 wrote to memory of 2444 2700 cmd.exe 42 PID 2700 wrote to memory of 1452 2700 cmd.exe 88 PID 2700 wrote to memory of 1048 2700 cmd.exe 69 PID 2700 wrote to memory of 660 2700 cmd.exe 7 PID 2700 wrote to memory of 1840 2700 cmd.exe 32 PID 2700 wrote to memory of 2824 2700 cmd.exe 51 PID 2700 wrote to memory of 64 2700 cmd.exe 13 PID 2700 wrote to memory of 2624 2700 cmd.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Executes dropped EXE
PID:612 -
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:780
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Executes dropped EXE
PID:64
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Executes dropped EXE
PID:660
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Executes dropped EXE
- Modifies registry class
PID:792 -
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵
- Executes dropped EXE
PID:2492
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3880
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵
- Executes dropped EXE
PID:3968
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:1036
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
- Executes dropped EXE
PID:3736
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵
- Executes dropped EXE
PID:2508
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:2704
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵
- Executes dropped EXE
PID:4324
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
- Executes dropped EXE
PID:4380
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding2⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:1452
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:3140
-
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding2⤵
- Loads dropped DLL
PID:4496
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵
- Executes dropped EXE
PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
- Executes dropped EXE
PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
- Executes dropped EXE
PID:508
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
- Executes dropped EXE
PID:988
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵
- Executes dropped EXE
PID:1012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
- Executes dropped EXE
PID:1104
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
- Executes dropped EXE
PID:1112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:1120 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
- Executes dropped EXE
PID:2776
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Executes dropped EXE
- Indicator Removal: Clear Windows Event Logs
PID:1144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
- Executes dropped EXE
PID:1268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
- Executes dropped EXE
PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
- Executes dropped EXE
PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
- Executes dropped EXE
PID:1420 -
C:\Windows\system32\sihost.exesihost.exe2⤵
- Executes dropped EXE
PID:2616
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
- Executes dropped EXE
PID:1432
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
- Executes dropped EXE
PID:1540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
- Executes dropped EXE
PID:1548
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵
- Executes dropped EXE
PID:1640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
- Executes dropped EXE
PID:1696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵
- Executes dropped EXE
PID:1728
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
- Executes dropped EXE
PID:1776
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
- Executes dropped EXE
PID:1840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵
- Executes dropped EXE
PID:1924
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
- Executes dropped EXE
PID:1932
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
- Executes dropped EXE
PID:1196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
- Executes dropped EXE
PID:1660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Executes dropped EXE
PID:2104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵
- Executes dropped EXE
PID:2156
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
- Executes dropped EXE
PID:2200
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
- Executes dropped EXE
PID:2292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
- Executes dropped EXE
PID:2444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
- Executes dropped EXE
PID:2452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
- Executes dropped EXE
PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵
- Executes dropped EXE
PID:2796
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
- Executes dropped EXE
PID:2816
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
- Executes dropped EXE
PID:2824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵
- Executes dropped EXE
PID:2904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
- Executes dropped EXE
PID:3468
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\0oj3.exe"C:\Users\Admin\AppData\Local\Temp\0oj3.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\cmd.execmd.exe3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "cmd" /tr '"C:\ProgramData\cmd.exe"' & exit5⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "cmd" /tr '"C:\ProgramData\cmd.exe"'6⤵
- Scheduled Task/Job: Scheduled Task
PID:4900
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" create AutoRunService binPath="C:\Program Files\cmd.exe" type=own start=auto5⤵
- Launches sc.exe
PID:4780
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" start AutoRunService5⤵
- Launches sc.exe
PID:456
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
- Executes dropped EXE
PID:3700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:5116
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
- Executes dropped EXE
PID:2372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
- Executes dropped EXE
PID:5092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1048
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
- Executes dropped EXE
PID:3664
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵
- Executes dropped EXE
PID:4736
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 6b6a82f0786ae23f9eb64979f452c5a3 9qSHcJymP0CteioRg+9DsQ.0.1.0.0.01⤵PID:1280
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Loads dropped DLL
PID:1664
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Loads dropped DLL
PID:1748
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
- Loads dropped DLL
PID:2888
-
C:\Program Files\cmd.exe"C:\Program Files\cmd.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Loads dropped DLL
PID:1652
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD55d864ba27836417dbbb494b3a5d888a9
SHA166b87eb33a31d18ac8c89d237c2235b80ecc1b79
SHA2560f916874ee10e6b39afb2319eb33ee8f6b6d1b11f223ce859ead0b1375f84b36
SHA5126f59639c1b1ec0f928347d2ec7da1c46a5b2c9ef3cff71d2e4ec8009b6a97ca0f033d27a830d4efd697f99982c2a86f6620cd9e392918756425223ca9caafdf6
-
Filesize
2.2MB
MD5dd2b4161313175caffafa7fa4ee184c6
SHA1e660e3063e7771425e1edfffc45d8387c090fb59
SHA256c2572e03276acd9c8b641606eb123a304ddfcb1bab172706ce863b1102e42bf4
SHA512ed567c0d9827969a66c43dd7c5ac552c18a4f7f4c9063cda30badceddb0397faa14dbef4bb7730b00dc78e55d6f05adc3c149e37a6517f944e4d179e1ae49ce0
-
Filesize
112KB
MD56a0f36515a46c1a29da10d9aaf6c2193
SHA147f57d38c99d2e9d6cdbb8c8ef9da9eb2b9f6365
SHA256ee45c3f9d8b46a1414a313b356c14ef728847072ad01791924eef53215f2e937
SHA5123e33c23b2d0de819fa7cdde962c14934b14d81438f5df0b48e450a851ded2f03809ee80246241d8df2c8768f12a4176792f39808534fdbaea8d00cd41b3a6e02
-
Filesize
2KB
MD58abf2d6067c6f3191a015f84aa9b6efe
SHA198f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7
SHA256ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea
SHA512c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63
-
Filesize
2KB
MD5f313c5b4f95605026428425586317353
SHA106be66fa06e1cffc54459c38d3d258f46669d01a
SHA256129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b
SHA512b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890
-
Filesize
2KB
MD5ceb7caa4e9c4b8d760dbf7e9e5ca44c5
SHA1a3879621f9493414d497ea6d70fbf17e283d5c08
SHA25698c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9
SHA5121eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff
-
Filesize
2KB
MD57d612892b20e70250dbd00d0cdd4f09b
SHA163251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5
SHA256727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02
SHA512f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1
-
Filesize
2KB
MD51e8e2076314d54dd72e7ee09ff8a52ab
SHA15fd0a67671430f66237f483eef39ff599b892272
SHA25655f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f
SHA5125b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6
-
Filesize
2KB
MD50b990e24f1e839462c0ac35fef1d119e
SHA19e17905f8f68f9ce0a2024d57b537aa8b39c6708
SHA256a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a
SHA512c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4