Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 18:51
Behavioral task
behavioral1
Sample
126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe
Resource
win10v2004-20241007-en
General
-
Target
126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe
-
Size
768KB
-
MD5
a93eeb5fc2c4ba7d97d8351fb0cb7190
-
SHA1
67bfc742acc1c2cf9d9a5f2d0f3b01829388ce44
-
SHA256
126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1
-
SHA512
1282356db54bc7fc1af2a708d07bf7844544cbcec745111737ac4435c353e8f4b94703abc8bd842f482e1dfbedfdabf9f917f524fa3196d49da43ea367f7556c
-
SSDEEP
12288:ngby1pKmZmjrWinaxABtyZPyoOOORtfWV5gk3VP0nkVg3gX:Yy1pVmjrWivBtyZPy2ORt+V5ggVP0tQX
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 14 2364 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\International\Geo\Nation 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe -
Loads dropped DLL 4 IoCs
pid Process 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\34B6AF881B9D738561FC099B83DF3A01 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\34B6AF881B9D738561FC099B83DF3A01 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0072000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{35BAD06E-581A-49B1-B3FA-63F111B56D9D}\WpadNetworkName = "Network 3" 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{35BAD06E-581A-49B1-B3FA-63F111B56D9D}\WpadDecisionReason = "1" 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{35BAD06E-581A-49B1-B3FA-63F111B56D9D}\WpadDecision = "0" 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-92-44-70-9e-90 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-92-44-70-9e-90\WpadDecisionReason = "1" 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{35BAD06E-581A-49B1-B3FA-63F111B56D9D} 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr3 = 33f160659411d883acd0ef58a0d331d32480f0fbbad4593a6e1351269c65f31f1c5997924be6fd2fea18e34315531eba2cf87ae77897bb00d702c241e4b1eb578789d9eeb5ff45c0acca09 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{35BAD06E-581A-49B1-B3FA-63F111B56D9D}\WpadDecisionTime = 20a3b5122365db01 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{35BAD06E-581A-49B1-B3FA-63F111B56D9D}\22-92-44-70-9e-90 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-92-44-70-9e-90\WpadDecisionTime = 20a3b5122365db01 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-92-44-70-9e-90\WpadDecision = "0" 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 2364 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2780 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2780 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2780 2668 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe 31 PID 2668 wrote to memory of 2780 2668 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe 31 PID 2668 wrote to memory of 2780 2668 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe 31 PID 2668 wrote to memory of 2780 2668 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe 31 PID 2780 wrote to memory of 2364 2780 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe 32 PID 2780 wrote to memory of 2364 2780 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe 32 PID 2780 wrote to memory of 2364 2780 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe 32 PID 2780 wrote to memory of 2364 2780 126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe"C:\Users\Admin\AppData\Local\Temp\126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3020
-
C:\Users\Admin\AppData\Local\Temp\126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe"C:\Users\Admin\AppData\Local\Temp\126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe" -service -lunch1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe"C:\Users\Admin\AppData\Local\Temp\126a57040b5fa867b6b0e851569ad48ecfac90ff547c3fb5f0aee4a6601d08b1N.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\AMMYY\aa_nts.dll",run3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
902KB
MD5480a66902e6e7cdafaa6711e8697ff8c
SHA16ac730962e7c1dba9e2ecc5733a506544f3c8d11
SHA2567eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5
SHA5127d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5
-
Filesize
4KB
MD5e15afe750c729483c8ccecd346f32842
SHA14c59cb0ae52e0988d3a8350fd73cf329f5663b95
SHA256e9bd721b8f16635f243d6a526baba10fa56434ed36158a4d89a5164e8aa65245
SHA512e76225c7e8a6d80c4817ddf25ada65d329a4957a578d3ce9c98e0d0013618ec0d1bce77101537c8b4bb72fb13ce21679f6aaa4fe1f4f8886cc25f0a832a37d4c
-
Filesize
45B
MD5f5d867c23b8cac17baecc8cd2ac118b9
SHA1ab0da5d10496611ae18f28822c32507aa531dfc4
SHA25652ebeac5f05e8e12afb680e5e291b41a440cc7dbb812fddd075b6f7586c4fd2b
SHA5121a067037fb1a8f6782681902e6dc391e399c5caf3e430bdacc30d2cd36985d4eff72359d676e7799dbac3f2f58f697181934a67af18a366cb58a69e6f56e837d
-
Filesize
316B
MD54d75d61260a946b1017c2bae293cabc7
SHA105257b0afe1113f1eded4b5aafdbe0feb8457d5b
SHA25685fa7940ba5b07606dd152ca23dcd1ed27a99d3c9f5ff58f4f95cec4ffc9cf6f
SHA512e3dd5011cce6adb6d2f79a34b2cf59c40783d8d9ba66e3d190d8077e4bde1e3ec0d5afe5f720ff8064d554e6f8a5a4a0ee2462681c8affaec1bed1ef60b54969