Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 14:12
Static task
static1
Behavioral task
behavioral1
Sample
b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe
Resource
win7-20241023-en
General
-
Target
b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe
-
Size
610KB
-
MD5
cfa8191b3ff2d4c91719db8affaa6090
-
SHA1
1bc6a3276fc444c1faed44347b3180eb8b3803bd
-
SHA256
b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7
-
SHA512
8a24aab9c09bb018b7dbe4c78d5437e1bb13aa94111240da99450b3728e2aefd1149c5e007aaefc1856ee591d5e2a8e12bfd96dfa9f620733c835901994cc572
-
SSDEEP
12288:BPrneXCtwpxa5ICfznTODkiRrZ3VpWCDy7Frd3:BPr4CmpxayCfznTkhVpN6rd
Malware Config
Signatures
-
Expiro family
-
Expiro payload 2 IoCs
resource yara_rule behavioral2/memory/3996-2-0x0000000000400000-0x0000000000656000-memory.dmp family_expiro1 behavioral2/memory/4176-20-0x0000000140000000-0x0000000140417000-memory.dmp family_expiro1 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 5 IoCs
pid Process 4176 elevation_service.exe 3864 elevation_service.exe 2420 maintenanceservice.exe 2300 OSE.EXE 2620 ssh-agent.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-4089630652-1596403869-279772308-1000 elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-4089630652-1596403869-279772308-1000\EnableNotifications = "0" elevation_service.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mdgkfajodaliacghnafobjnclblcfmlm\1.0_0\manifest.json b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\L: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\O: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\P: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\W: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\O: elevation_service.exe File opened (read-only) \??\H: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\X: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\N: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\T: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\I: elevation_service.exe File opened (read-only) \??\Q: elevation_service.exe File opened (read-only) \??\S: elevation_service.exe File opened (read-only) \??\V: elevation_service.exe File opened (read-only) \??\X: elevation_service.exe File opened (read-only) \??\E: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\M: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\Y: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\Z: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\K: elevation_service.exe File opened (read-only) \??\P: elevation_service.exe File opened (read-only) \??\W: elevation_service.exe File opened (read-only) \??\I: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\J: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\S: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\U: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\G: elevation_service.exe File opened (read-only) \??\H: elevation_service.exe File opened (read-only) \??\J: elevation_service.exe File opened (read-only) \??\Y: elevation_service.exe File opened (read-only) \??\Q: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\R: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\V: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\L: elevation_service.exe File opened (read-only) \??\M: elevation_service.exe File opened (read-only) \??\G: b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened (read-only) \??\E: elevation_service.exe File opened (read-only) \??\N: elevation_service.exe File opened (read-only) \??\R: elevation_service.exe File opened (read-only) \??\T: elevation_service.exe File opened (read-only) \??\U: elevation_service.exe File opened (read-only) \??\Z: elevation_service.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\svchost.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\alg.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created \??\c:\windows\system32\hiqbemaj.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\Agentservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\lsass.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created \??\c:\windows\system32\kbmiephh.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\searchindexer.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\dllhost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\Agentservice.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\vds.exe elevation_service.exe File opened for modification \??\c:\windows\system32\searchindexer.exe elevation_service.exe File opened for modification \??\c:\windows\system32\locator.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\lmmigkcd.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe elevation_service.exe File opened for modification \??\c:\windows\system32\spectrum.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created \??\c:\windows\system32\openssh\oclemleq.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\vssvc.exe elevation_service.exe File created \??\c:\windows\system32\mkmepnpo.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\dllhost.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created \??\c:\windows\system32\lafhfjbb.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\msiexec.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\alg.exe elevation_service.exe File opened for modification \??\c:\windows\system32\msdtc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\msiexec.exe elevation_service.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\wbengine.exe elevation_service.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\msdtc.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\gappqijh.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created \??\c:\windows\system32\angndeel.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\vds.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\Appvclient.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\spectrum.exe elevation_service.exe File created \??\c:\windows\SysWOW64\bqmgomjp.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\wbengine.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\system32\Appvclient.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk-1.8\bin\cgakfigd.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\pnqggbpc.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created \??\c:\program files\common files\microsoft shared\source engine\ifmebkno.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\dotnet\gakpqfhp.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\dmkcmlkj.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\bin\mekilqcj.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\bin\phgiobhi.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\kggjdgjn.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\hnimnphp.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe elevation_service.exe File created C:\Program Files\Java\jdk-1.8\bin\ofbhkgdg.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\7-Zip\ncjookla.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\elaqljie.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Common Files\microsoft shared\ink\jiianoje.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\bin\nlfifejp.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\nimidobm.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\bin\feqkbkgm.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\bin\qqlagjep.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\nklemblo.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\bhlnifll.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\klonohhl.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\bin\jdnejaho.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\fjkphpcb.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe elevation_service.exe File created C:\Program Files\Common Files\microsoft shared\ink\gdaoemja.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\odadaonc.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\cpkcoelj.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\bin\acdacdcn.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\bin\ooclgjlk.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\bin\fnkcikpn.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\mcfbcncj.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File created C:\Program Files\Java\jdk-1.8\bin\elmcbqaa.tmp b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe elevation_service.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe 4176 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3996 b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe Token: SeTakeOwnershipPrivilege 4176 elevation_service.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" elevation_service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe"C:\Users\Admin\AppData\Local\Temp\b760bcf51fccff727d6e3e0fc44ff4eac267ab82a77604912897282e194baac7N.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4176
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3864
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2420
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2300
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:2620
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD52f0a8fe160430d245910392b0da32002
SHA146522fbd475b8ae2f4dbc32f65f0037bbc651bac
SHA2566f5f2da57d67a3720c61f9541318bf4342fe277ca475846bcc1af54476dc6322
SHA5129fe281cbf2b7bb42fb5bed9a214f15843f6a67a60bdac67a607cf4230c9d2574a88f3fb217930bff88dc8436f9af386c600d654510eaeafc20b30e437736fdfc
-
Filesize
777KB
MD5cb88f8f62501867ce31dbdab0a871f88
SHA166cb4e75dfaef6c8e9c46d54ba1239c4fed2d840
SHA2564a62ef6feef8ac71789d199014317eb98d6c74853050e52761c1470e9091b7ca
SHA5124f8bb0055b36b9d04536c6ab2117e9e8f1b1192f6bcb276a2ade00840230d05b57be4cc3671bb0091c20a339f0e1e04488b642548c35773217510c9153f72986
-
Filesize
1.1MB
MD595db16c85b0bb6718bf9569df8969f09
SHA1e1592fe7bd1682a01b36bbfd3c7d71a4a3cb42df
SHA25689ab1ec0e7a4015d2eb3db6947c3eb5fe2322e6bfda9e1ea5e3eccde04598fba
SHA512314670aced7815379e74b02df75187638a9b577064b17d7da6e89a627a3257083d0a9525b73478a70767e9419e3692ce125baeadcdd35d77db162637c0a28401
-
Filesize
1.4MB
MD52d13e583ea7ad2c9c7a30eec2d633404
SHA1d37163075c3201a08ebf9b3843b58c92700ca949
SHA2560d9d2b9c743e520d4395841d4c490946d37099f0ffda7c8b3c74c4e39bfff134
SHA5120ffb60d2a1f031483d47c1ea2db1d98047e577d0364f59e88b641296267c47756f3e4c6d42dcdf91f4b9cf01abb6497d6d9ee8880d1e9b9a35ad25e296244a8e
-
Filesize
1.2MB
MD56c0a7d0ea3efa25db93a916e2e530ecc
SHA1f86d5f1cc9ce322795796a682ef13135a20f746f
SHA25675d2d7f4211a7e35a14a2dcdfbf87e711e1ec570299d1e901c72382c6ef7a7dd
SHA512ce7ecf25ce100e158783c8a2e80a3318ea7158d6d478d5e2dc7fc4ae0264e8f55db51460ca771066939117c0554c6b388c39e8f5a92d77b099006862ee504606
-
Filesize
828KB
MD568b81589c4cc2d03122ecdfb435cca16
SHA1fd4b8ad91dfa99237ca6dc5da5176ddc309e8f25
SHA256c241f9f552c8d28407ba20026ce2f069228bc14682a97400774bde2dd8b5d652
SHA5125ce478bf04531876d743693d57a4166b536cae97fc13235d1671d9de9abad5820648f0c3fe4d84d597bcbcc6094f94a410dfcafa6791a60ec8eb00f495d15496
-
Filesize
4.6MB
MD51f3d7a5ddf6726d606598c67c0778755
SHA18c9aa542337b9cd54493f67d516b095931b6c341
SHA256d23d8d7243f32c9e46b4ee2a5ef4f5303781c00a1dd255051a4ae14e0b1b06bb
SHA512ce340f3e8ed4521e61645c17a5f1c5cecb5a77e4ccf6220d2e4f6af304e67371c9376e94e997348518a950250d41df17b85ed1b194d4bc053c5aa44214f52872
-
Filesize
898KB
MD580383b876ef1f10c6485202ae553a77d
SHA1cf16c2743f12c48c86f3ed02e867395370e07e78
SHA2562599dec6f8c6ae26a717615915edb0b18b164f02899b5806bc82bebc882a2d1c
SHA512a5a16a7ffe79140693dbd43d22bbd5269c0b6bcc6bf26c278631da5af0ccd7543dc141b99f5a0f9f2d140553ac2949cbc4afdc177e5547f9dba3164e584bbe94
-
Filesize
24.0MB
MD50bbe23f9f76d64a9edb02ecc8f394e7f
SHA12980d4a3acf209fe2a3883065aaea06b862d0c41
SHA256df2bba1b82e48a972945a69fadcd7681e6853f83c395f2166823349b4c458be6
SHA512f1d1acbab4c0ff35b3fc36039c3ab70c80b121d61099db03219e208f9b84c5f3ac6098db337f7d3ea646502fbbfa58810ad25282f2bcd6161a1aff97fdfdb054
-
Filesize
2.7MB
MD5075454723cc43feb778729bfaf7d18f2
SHA16f9649a114bd5c59b219f5877ccb16b9a70df2a1
SHA256d232ea9881898308be16d9bfae39a7ad6bae3a42902e2ce7dce9c97972da1968
SHA5123899c2f592f4e72d72221d9cddb9216bc834233c7af2ef5659372b33ba898a526deb04b7d6cb9a2894d667a386fa9e62ae44c7671362d7229442b6cabc294017
-
Filesize
793KB
MD5edf52a9d2ac6b9e21563970c030fe0a4
SHA1eae1a24a84a60d3746951076616eb6ed40b2e645
SHA2564707fa9056be7fd16d11235df37ee1165188a141c40c68a213a5ba13b8b0298f
SHA512cc7d6e3fa8f2ffde4e0173c9ec5e64e04255ef35b8b1903e4655752cd9f6e1a7e4c6379e95d63d509b0b7065a717b1a57b38ad7963d38a7d4f731d689b879db2
-
Filesize
4.6MB
MD55d0d72c1705d8529937dc515a5cd98eb
SHA12e8483246a7bb3f1982abaa023fdfa914d7362b9
SHA256e30b10abfa9a671ae056f05288f2c85a04f8d2b4db7a3cb54b4656e6a07c12d4
SHA512ea406e6023146892db8796547f9324b858d78b38fe0ac91cb77427fd10ace6f935d9b30af26e922e27b0f227bc0660346fe5112c3345d761016a78da847e60d0
-
Filesize
2.1MB
MD5a76710eb530c2239cbb12efa848fb207
SHA1829bd5fc6d01d8e22f5c40853a5b6897a9f8b548
SHA25644235e109a33d59ae49beb907928c9f7814c3ec0d311c0ede0478c2d634c3c74
SHA5122a2b20620952f5a73253235d553fc6f4fb001c0ce4e88b1ef3bf5105a04192db844dbd70db824eb6bd416310dac10410e3ef7361b9a4a37cd535aeac9fe3e1c9
-
Filesize
1.3MB
MD5b735bbb8bf22994ccb800f1e0194a855
SHA105e47aa3019dacfb16eb1d8e7fdb12a0c52edaea
SHA256fda2232e15528b568907c279563581c627c699992b570cb0d40bb5db5d797bff
SHA512b32dd4cf565e001bf987e7af7c273b77b766b641a83f46251621843d4fe49705a8456e45918eb0ef1491fe2d1f41727a9f1c928468bc13f4b6cf49f98dd7de21
-
Filesize
978KB
MD5b392b9b0291a3bfecb80de66901296d2
SHA1ef0454408a6ea1e9d17195eeecbbbba7264565ec
SHA25682bb7f7dd8a27ab8de308698e6c2a7cb762b2fc4c6a6f6fa1f396c7417550909
SHA512b9fa6f99014e967a24622567d139c93634d9d02992079afac3350200db80e3f17784d19647a958a42b6ae7f9b1cfc9939b0665eb50684c565f9bf2c18225e1a4
-
Filesize
928KB
MD50600b3f3384128a66ba3f10e2a44bd90
SHA198544c4c97ec4069941e9648d17fcb4b128822d3
SHA2561bca3811f7703700446fd324aa3bd99421ca194d932aa82c9f6096f1b32c2b6f
SHA5126150d653eb09fa1ab91fd3b1da12e8ef9ec219ad53a7787f63273b15eafaa182999e36e619ca98c4b6bb2da3d94ee395a7c4f1edf2e5a6e1b0e52df3d18adc7b
-
Filesize
1.3MB
MD57f7d5cc7e954c8f01a02105acecb78ab
SHA1c2813f3e0c3abe06db444f23c32f209754aaeb5c
SHA2567bfd8c8af2a931e763ab001bb4e970033085fca9f814e8d4efc4ca980e83f2b1
SHA512a9ff1a16d27c97b5753dca6865e121d863d71169ffaae8764b1742eba37b2bf2abed485d28c9257462f938a2bf9cbfde2ce75aa11b75b83e9a405eec42b51b3a
-
Filesize
1.5MB
MD55faef900de39eb0bb34b127762d2f533
SHA13ea0077c9b84565eba52d0934ea95127003b3380
SHA2568a593866a85deb13026c59f1908795812140e14a3775e30b026c7d4a4ef50454
SHA51249490339683d96e0d56011860b11e5d815b465445a315e00f9253242f75162d0d4942ac186a63448c742d8bf9e3693e1f1f434057b8c9bc243b63adbbdb9a93e
-
Filesize
1.7MB
MD526c5dcb88f2134e6eec185a76067134c
SHA167d538bf5eca2eb777ea9b96f41911df8fc3d3a4
SHA256bacff30b7afc7cbad468e83f07a6cde7f8493ef8c3fda4339225c14f9f697f65
SHA5121d020ccf2276792cad2e0737b595970ef996fa7eca780c87f789453f89c08828d06a85feecbe0a0d32ca1f3d8148cefc7106f54f2ce0dbea509ff88c539f1109
-
Filesize
1.2MB
MD52e8bd7b339b20c6b5d81c871e436fa6d
SHA1bcd4bb51faad8310be43b3d1f8a12e87efb63cf8
SHA25600d42be8cd33cf25d87a68e67b43148cc91c82feb5e0f6d34c062cac1dfe0299
SHA512a54458cab55e9505d42f88dff3cd419716ca439982a29406da08019a612077078bd38d128200648582470d285d06b55507228c647a2aabd576ea78fda7f55308
-
Filesize
700KB
MD5a36da686b1388a1efbc87b0a3027800f
SHA1f4ba61cc6a58cbf62dc4bfdfaed94b552494f69d
SHA25666855c2627a30f9e3899be1740776accb1f676b0d3e117d22f848a8a535aadda
SHA5127134903f7ffdd9cd8b28a74ecc42b93103e14fabf7f8a42a242d3d9528f4d10735276afe2825499f6703e332ae705638ec544bf3b5b4ca50ac9106b2d73f11e5
-
Filesize
623KB
MD5e3c852e9f7470af2c876a6a8fa1278be
SHA12a447acd84ba331ad9d6fecfd4efa2d691806c69
SHA256c5025d9e913fb486be3ad89323326357ffc575880d949cc0d2311cdfb66782ee
SHA512be7fbfdf32f23bbb2829267b6a47138412f050a50efe6ffabce104dcf982717c3c6c2a0651d6ed6fd67e8aba60416de95322c5d78c4bbfb3c39ec82df813efec
-
Filesize
572KB
MD58f3375c17bae1d2a89e937287fdb6dd9
SHA16126555de5dcb6eccad5ab0d5ff6d995b81e401c
SHA256b779769f32ea7dea630e4645add597c8acc15e03764feab7bae247982d0c2a75
SHA51227094bca25e1db9a68a51a0764054d91b237afb1364ef43919a74d33e17140d1b937508c34583da769dd51ab970e9e811ab1003a09a781dbda535b5db305e64c
-
Filesize
2.1MB
MD50eeb65ba57e671dd11405f80b728c9c4
SHA1c1b8bed8a002075bc21d15594a9368302c99a124
SHA2565d522de86588c082f4edd5742267ce1abb6e818a2d8fab7c0282390254da974e
SHA512463da879c85df18ac62619cde1a4c6bedaa89eb1b395238b5275dbba106d047dffc7e00105a0cc1d5219633d01757f55592008c40170c911ee1d336d184e88c3