Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe
Resource
win7-20241023-en
General
-
Target
abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe
-
Size
216KB
-
MD5
04da68ccae7faa684abfc3bc0b58cb40
-
SHA1
3df3a4e5a8c7226080c62db1eaafc01ad8d6a9a3
-
SHA256
abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510
-
SHA512
197a4598b306e07473ee634d68b684ca094cb9021c9690875d3a2205d44ce46ae5ac8ebe82377744540d34ab46d720b3c277a8d041c69caf783733b587e35a29
-
SSDEEP
3072:Ol6EgmJBkSju7dMIplpdWnWf1WYCPTkG8M8kkRqX66poLD8x8VnvupmYmcNovxC:O3BPju7B3zjNWlIG88k666qfVUFOpC
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NTDETECT.COM abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NTDETECT.COM abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe -
Executes dropped EXE 2 IoCs
pid Process 2532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe 2356 WaterMark.exe -
Loads dropped DLL 4 IoCs
pid Process 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 2532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe 2532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Screen Saver Pro 3.1 = "C:\\Users\\Admin\\AppData\\Roaming\\ScreenSaverPro.scr" abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wmfjff = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Wmfjff.exe" mspaint.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\D: mspaint.exe File opened (read-only) \??\F: mspaint.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\T: svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2160 set thread context of 2700 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 34 PID 2700 set thread context of 2600 2700 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 36 -
resource yara_rule behavioral1/memory/2532-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2532-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2532-13-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2532-22-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2532-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2532-8-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOMessageProvider.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jfxwebkit.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\System.IdentityModel.Selectors.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libdtv_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_copy_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\calendar.html svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\glib-lite.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libparam_eq_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_standard_plugin.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\libGLESv2.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libwebvtt_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkDiv.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\Timeline_is.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\msvcr100.dll svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHEV.DLL svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\VISSHE.DLL svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.ServiceModel.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libdshow_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\JNWDRV.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\journal.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\epl-v10.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jawt.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\libxml2.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Web.Entity.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libflac_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\calendar.html svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Data.DataSetExtensions.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.Extensions.Design.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libvorbis_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\ipcclientcerts.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libreal_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libxml_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile.html svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\VGX.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-localization-l1-2-0.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\mozavutil.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Data.Entity.Design.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libalphamask_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\System.Runtime.Serialization.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Windows.Presentation.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libspeex_resampler_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\wab32.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\UIAutomationTypes.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Data.Services.Design.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libaribsub_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libhqdn3d_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libtospdif_plugin.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-stdio-l1-1-0.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libflacsys_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\settings.html svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2356 WaterMark.exe 2356 WaterMark.exe 2356 WaterMark.exe 2356 WaterMark.exe 2356 WaterMark.exe 2356 WaterMark.exe 2356 WaterMark.exe 2356 WaterMark.exe 2964 svchost.exe 2964 svchost.exe 2600 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 2600 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2700 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 2356 WaterMark.exe Token: SeDebugPrivilege 2964 svchost.exe Token: SeDebugPrivilege 2356 WaterMark.exe Token: SeDebugPrivilege 2700 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe Token: SeDebugPrivilege 1540 svchost.exe Token: SeDebugPrivilege 2600 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe Token: SeDebugPrivilege 2764 mspaint.exe Token: SeDebugPrivilege 2600 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe Token: SeDebugPrivilege 2356 WaterMark.exe Token: SeDebugPrivilege 2964 svchost.exe Token: SeDebugPrivilege 2536 svchost.exe Token: SeDebugPrivilege 2700 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe Token: SeDebugPrivilege 1540 svchost.exe Token: SeDebugPrivilege 2764 mspaint.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2764 mspaint.exe 2764 mspaint.exe 2764 mspaint.exe 2764 mspaint.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe 2356 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2532 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 30 PID 2160 wrote to memory of 2532 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 30 PID 2160 wrote to memory of 2532 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 30 PID 2160 wrote to memory of 2532 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 30 PID 2532 wrote to memory of 2356 2532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe 31 PID 2532 wrote to memory of 2356 2532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe 31 PID 2532 wrote to memory of 2356 2532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe 31 PID 2532 wrote to memory of 2356 2532 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe 31 PID 2356 wrote to memory of 2536 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2536 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2536 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2536 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2536 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2536 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2536 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2536 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2536 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2536 2356 WaterMark.exe 32 PID 2356 wrote to memory of 2964 2356 WaterMark.exe 33 PID 2356 wrote to memory of 2964 2356 WaterMark.exe 33 PID 2356 wrote to memory of 2964 2356 WaterMark.exe 33 PID 2356 wrote to memory of 2964 2356 WaterMark.exe 33 PID 2356 wrote to memory of 2964 2356 WaterMark.exe 33 PID 2356 wrote to memory of 2964 2356 WaterMark.exe 33 PID 2356 wrote to memory of 2964 2356 WaterMark.exe 33 PID 2356 wrote to memory of 2964 2356 WaterMark.exe 33 PID 2356 wrote to memory of 2964 2356 WaterMark.exe 33 PID 2356 wrote to memory of 2964 2356 WaterMark.exe 33 PID 2160 wrote to memory of 2700 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 34 PID 2160 wrote to memory of 2700 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 34 PID 2160 wrote to memory of 2700 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 34 PID 2160 wrote to memory of 2700 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 34 PID 2964 wrote to memory of 256 2964 svchost.exe 1 PID 2964 wrote to memory of 256 2964 svchost.exe 1 PID 2964 wrote to memory of 256 2964 svchost.exe 1 PID 2964 wrote to memory of 256 2964 svchost.exe 1 PID 2964 wrote to memory of 256 2964 svchost.exe 1 PID 2964 wrote to memory of 332 2964 svchost.exe 2 PID 2964 wrote to memory of 332 2964 svchost.exe 2 PID 2964 wrote to memory of 332 2964 svchost.exe 2 PID 2964 wrote to memory of 332 2964 svchost.exe 2 PID 2964 wrote to memory of 332 2964 svchost.exe 2 PID 2964 wrote to memory of 384 2964 svchost.exe 3 PID 2964 wrote to memory of 384 2964 svchost.exe 3 PID 2964 wrote to memory of 384 2964 svchost.exe 3 PID 2964 wrote to memory of 384 2964 svchost.exe 3 PID 2964 wrote to memory of 384 2964 svchost.exe 3 PID 2964 wrote to memory of 396 2964 svchost.exe 4 PID 2964 wrote to memory of 396 2964 svchost.exe 4 PID 2964 wrote to memory of 396 2964 svchost.exe 4 PID 2964 wrote to memory of 396 2964 svchost.exe 4 PID 2964 wrote to memory of 396 2964 svchost.exe 4 PID 2964 wrote to memory of 432 2964 svchost.exe 5 PID 2964 wrote to memory of 432 2964 svchost.exe 5 PID 2964 wrote to memory of 432 2964 svchost.exe 5 PID 2160 wrote to memory of 2700 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 34 PID 2964 wrote to memory of 432 2964 svchost.exe 5 PID 2160 wrote to memory of 2700 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 34 PID 2964 wrote to memory of 432 2964 svchost.exe 5 PID 2160 wrote to memory of 2700 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 34 PID 2964 wrote to memory of 476 2964 svchost.exe 6 PID 2160 wrote to memory of 2700 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 34 PID 2964 wrote to memory of 476 2964 svchost.exe 6 PID 2160 wrote to memory of 2700 2160 abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe 34
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:616
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1264
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1772
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}4⤵PID:2092
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}4⤵PID:1104
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:692
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:768
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:828
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1176
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:864
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2564
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:984
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:280
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:932
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1084
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1124
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1548
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:3064
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2188
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k imgsvc3⤵PID:2072
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe"C:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exeC:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe"C:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe"3⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:2700 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe"5⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
-
C:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe"C:\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510N.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize132KB
MD51b1998eda376d07efaced862eda9e12a
SHA1ce16e49774c30a644e077645c2008833643aff5e
SHA2564749d60233521cd832be587ad1f94cb0503bb08e0274f0978f0d2ce17e664670
SHA512edb8ec6c5ce6925463b7187ea51740dbf2575d74af4672139f789cd978426c00a577103a97c4027f4cef8b086d5b85995b939d516480055f31f7b788e77c786d
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize129KB
MD595e02673993bf7e82d65953c7fa8b7bc
SHA13b7921fd75a088af339055dd12415f01d17b9a7a
SHA256d54027bc73939fd002fc7d869128cf79b44ab8bc467d192c43aefba557b62806
SHA5120140440e2eed620ed5791139e83c5ce5d28813cebbe9ec846c39c1461f03aeace4cbf136dde091753a614b0c7f354995ce1f4816401a574e98f153a15449713a
-
\Users\Admin\AppData\Local\Temp\abfc874a90bfc092dc4eda51f6857740972e9a644019f8573276ab85566b9510Nmgr.exe
Filesize59KB
MD5a2140ffa40095f183b9391c0d3173462
SHA1114f9b32c8c3b443bc6b6d136e5367160f04597d
SHA256a816e9d9ac773fc178756269ac79c93f61c33b8f4c92fca08e89b1eb31fe2b53
SHA512037ff28bb852c8ded8c8a980b65e32eaad8f6a3bd33fb122f097507bc4a756b4c34b8bc37ffa581ed21e29de21a84af279f5fc6cfecf87e5d4bd2bc955d4804b