Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
31/01/2025, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
services.png.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
services.png.exe
Resource
win10v2004-20250129-en
General
-
Target
services.png.exe
-
Size
264KB
-
MD5
d397a1de162f332782fe3205a07792dd
-
SHA1
44793b3a374c3cb453bbd87a2fd28d8a4c408002
-
SHA256
ea251bf7fcc0a42cb9e954a45d925ef379ef1ffca39e482f44af701b4ace8560
-
SHA512
6be10fc6ebabffadd89a72862c5d292e2939d165298019fe684de4efb3284603756c8764810835c12651ad49f608dd3345c8d778b7fd795683f0fcceeaa3f659
-
SSDEEP
6144:VtjNiEZdoTD3wad4eq5OxUatA04d0drsFp2A4AG5uU:VTdS3Uek0WchA2D
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6987227198:AAGW8xEs5eNdfO7EF-8152h-RqJkKbn52BE/sendMessage?chat_id=1075483951
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
gurcu
https://api.telegram.org/bot6987227198:AAGW8xEs5eNdfO7EF-8152h-RqJkKbn52BE/sendMessage?chat_id=1075483951
https://api.telegram.org/bot6987227198:AAGW8xEs5eNdfO7EF-8152h-RqJkKbn52BE/sendDocument?chat_id=107548395
https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=109642586
Signatures
-
Asyncrat family
-
Gurcu family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023c5f-114.dat family_stormkitty behavioral2/memory/4452-127-0x0000000000CE0000-0x0000000000D10000-memory.dmp family_stormkitty -
Stormkitty family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023c5f-114.dat family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4848 powershell.exe 1524 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 3 IoCs
flow pid Process 54 1976 cuasaraxuf.exe 56 1976 cuasaraxuf.exe 48 1976 cuasaraxuf.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts updater.exe File created C:\Windows\system32\drivers\etc\hosts smbhost.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4396 netsh.exe -
Stops running service(s) 4 TTPs
-
Executes dropped EXE 5 IoCs
pid Process 1976 cuasaraxuf.exe 4452 UIServices.exe 5036 smbhost.exe 5052 SearchUI.exe 3200 updater.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 4424 services.png.exe 4424 services.png.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ziunercio = "C:\\Users\\Admin\\AppData\\Roaming\\Ywdyivro\\cuasaraxuf.exe" cuasaraxuf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\a7ab6012033be9ffc0c60b58a45c8fc0\Admin@BRWCNDMR_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini UIServices.exe File created C:\Users\Admin\AppData\Local\a7ab6012033be9ffc0c60b58a45c8fc0\Admin@BRWCNDMR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini UIServices.exe File created C:\Users\Admin\AppData\Local\a7ab6012033be9ffc0c60b58a45c8fc0\Admin@BRWCNDMR_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini UIServices.exe File created C:\Users\Admin\AppData\Local\a7ab6012033be9ffc0c60b58a45c8fc0\Admin@BRWCNDMR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini UIServices.exe File created C:\Users\Admin\AppData\Local\a7ab6012033be9ffc0c60b58a45c8fc0\Admin@BRWCNDMR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini UIServices.exe File opened for modification C:\Users\Admin\AppData\Local\a7ab6012033be9ffc0c60b58a45c8fc0\Admin@BRWCNDMR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini UIServices.exe File created C:\Users\Admin\AppData\Local\a7ab6012033be9ffc0c60b58a45c8fc0\Admin@BRWCNDMR_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini UIServices.exe File opened for modification C:\Users\Admin\AppData\Local\a7ab6012033be9ffc0c60b58a45c8fc0\Admin@BRWCNDMR_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini UIServices.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 58 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4396 powercfg.exe 264 powercfg.exe 3180 powercfg.exe 404 powercfg.exe 1648 powercfg.exe 880 powercfg.exe 2532 powercfg.exe 3880 powercfg.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File opened for modification C:\Windows\system32\MRT.exe smbhost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1220 tasklist.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 4424 set thread context of 832 4424 services.png.exe 87 PID 4452 set thread context of 3200 4452 UIServices.exe 103 PID 3200 set thread context of 3788 3200 cmd.exe 105 PID 3200 set thread context of 2332 3200 cmd.exe 106 PID 3200 set thread context of 2388 3200 cmd.exe 107 PID 4452 set thread context of 4768 4452 UIServices.exe 108 PID 4768 set thread context of 4700 4768 cmd.exe 110 PID 4768 set thread context of 4952 4768 cmd.exe 111 PID 5036 set thread context of 984 5036 smbhost.exe 132 PID 3200 set thread context of 1644 3200 updater.exe 167 PID 3200 set thread context of 4396 3200 updater.exe 171 PID 3200 set thread context of 4356 3200 updater.exe 173 -
resource yara_rule behavioral2/memory/4452-123-0x0000000003010000-0x000000000307C000-memory.dmp upx behavioral2/memory/4452-122-0x0000000003010000-0x000000000307C000-memory.dmp upx behavioral2/memory/4452-126-0x0000000003010000-0x000000000307C000-memory.dmp upx behavioral2/files/0x0007000000023c93-255.dat upx behavioral2/memory/5052-257-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/5052-259-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/3200-309-0x0000000002FE0000-0x000000000304C000-memory.dmp upx behavioral2/memory/3200-308-0x0000000002FE0000-0x000000000304C000-memory.dmp upx behavioral2/memory/3200-310-0x0000000002FE0000-0x000000000304C000-memory.dmp upx behavioral2/memory/3788-316-0x0000000002F70000-0x0000000002FDC000-memory.dmp upx -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4808 sc.exe 2140 sc.exe 3700 sc.exe 748 sc.exe 2996 sc.exe 5092 sc.exe 4776 sc.exe 1340 sc.exe 2248 sc.exe 4492 sc.exe 2940 sc.exe 4988 sc.exe 1272 sc.exe 4152 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HOSTNAME.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cuasaraxuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UIServices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.png.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SearchUI.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 3200 cmd.exe 2332 netsh.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SearchUI.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 UIServices.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 UIServices.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SearchUI.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString = "Intel(R) Core(TM) i7-8750H CPU @ 5.00 GHz" SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier UIServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3180 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Software\Microsoft\Internet Explorer\Privacy services.png.exe Set value (int) \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\SOFTWARE\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" services.png.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs dialer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT dialer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={9794D94A-29BB-475B-B468-9AE6B57CD9BD}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1738317701" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,508368333,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates dialer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Fri, 31 Jan 2025 10:01:42 GMT" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs dialer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4424 services.png.exe 4424 services.png.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 4452 UIServices.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 5036 smbhost.exe 4848 powershell.exe 4848 powershell.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 1976 cuasaraxuf.exe 5036 smbhost.exe 5036 smbhost.exe 5036 smbhost.exe 5036 smbhost.exe 5036 smbhost.exe 5036 smbhost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 4424 services.png.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 832 cmd.exe Token: SeSecurityPrivilege 832 cmd.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe Token: SeSecurityPrivilege 1976 cuasaraxuf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3996 RuntimeBroker.exe 3452 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 1976 4424 services.png.exe 86 PID 4424 wrote to memory of 1976 4424 services.png.exe 86 PID 4424 wrote to memory of 1976 4424 services.png.exe 86 PID 1976 wrote to memory of 2672 1976 cuasaraxuf.exe 44 PID 1976 wrote to memory of 2672 1976 cuasaraxuf.exe 44 PID 1976 wrote to memory of 2672 1976 cuasaraxuf.exe 44 PID 1976 wrote to memory of 2672 1976 cuasaraxuf.exe 44 PID 1976 wrote to memory of 2672 1976 cuasaraxuf.exe 44 PID 1976 wrote to memory of 2692 1976 cuasaraxuf.exe 45 PID 1976 wrote to memory of 2692 1976 cuasaraxuf.exe 45 PID 1976 wrote to memory of 2692 1976 cuasaraxuf.exe 45 PID 1976 wrote to memory of 2692 1976 cuasaraxuf.exe 45 PID 1976 wrote to memory of 2692 1976 cuasaraxuf.exe 45 PID 1976 wrote to memory of 2952 1976 cuasaraxuf.exe 51 PID 1976 wrote to memory of 2952 1976 cuasaraxuf.exe 51 PID 1976 wrote to memory of 2952 1976 cuasaraxuf.exe 51 PID 1976 wrote to memory of 2952 1976 cuasaraxuf.exe 51 PID 1976 wrote to memory of 2952 1976 cuasaraxuf.exe 51 PID 1976 wrote to memory of 3452 1976 cuasaraxuf.exe 56 PID 1976 wrote to memory of 3452 1976 cuasaraxuf.exe 56 PID 1976 wrote to memory of 3452 1976 cuasaraxuf.exe 56 PID 1976 wrote to memory of 3452 1976 cuasaraxuf.exe 56 PID 1976 wrote to memory of 3452 1976 cuasaraxuf.exe 56 PID 1976 wrote to memory of 3612 1976 cuasaraxuf.exe 57 PID 1976 wrote to memory of 3612 1976 cuasaraxuf.exe 57 PID 1976 wrote to memory of 3612 1976 cuasaraxuf.exe 57 PID 1976 wrote to memory of 3612 1976 cuasaraxuf.exe 57 PID 1976 wrote to memory of 3612 1976 cuasaraxuf.exe 57 PID 1976 wrote to memory of 3800 1976 cuasaraxuf.exe 58 PID 1976 wrote to memory of 3800 1976 cuasaraxuf.exe 58 PID 1976 wrote to memory of 3800 1976 cuasaraxuf.exe 58 PID 1976 wrote to memory of 3800 1976 cuasaraxuf.exe 58 PID 1976 wrote to memory of 3800 1976 cuasaraxuf.exe 58 PID 1976 wrote to memory of 3896 1976 cuasaraxuf.exe 59 PID 1976 wrote to memory of 3896 1976 cuasaraxuf.exe 59 PID 1976 wrote to memory of 3896 1976 cuasaraxuf.exe 59 PID 1976 wrote to memory of 3896 1976 cuasaraxuf.exe 59 PID 1976 wrote to memory of 3896 1976 cuasaraxuf.exe 59 PID 1976 wrote to memory of 3996 1976 cuasaraxuf.exe 60 PID 1976 wrote to memory of 3996 1976 cuasaraxuf.exe 60 PID 1976 wrote to memory of 3996 1976 cuasaraxuf.exe 60 PID 1976 wrote to memory of 3996 1976 cuasaraxuf.exe 60 PID 1976 wrote to memory of 3996 1976 cuasaraxuf.exe 60 PID 1976 wrote to memory of 4084 1976 cuasaraxuf.exe 61 PID 1976 wrote to memory of 4084 1976 cuasaraxuf.exe 61 PID 1976 wrote to memory of 4084 1976 cuasaraxuf.exe 61 PID 1976 wrote to memory of 4084 1976 cuasaraxuf.exe 61 PID 1976 wrote to memory of 4084 1976 cuasaraxuf.exe 61 PID 1976 wrote to memory of 4108 1976 cuasaraxuf.exe 62 PID 1976 wrote to memory of 4108 1976 cuasaraxuf.exe 62 PID 1976 wrote to memory of 4108 1976 cuasaraxuf.exe 62 PID 1976 wrote to memory of 4108 1976 cuasaraxuf.exe 62 PID 1976 wrote to memory of 4108 1976 cuasaraxuf.exe 62 PID 1976 wrote to memory of 4756 1976 cuasaraxuf.exe 74 PID 1976 wrote to memory of 4756 1976 cuasaraxuf.exe 74 PID 1976 wrote to memory of 4756 1976 cuasaraxuf.exe 74 PID 1976 wrote to memory of 4756 1976 cuasaraxuf.exe 74 PID 1976 wrote to memory of 4756 1976 cuasaraxuf.exe 74 PID 1976 wrote to memory of 2568 1976 cuasaraxuf.exe 76 PID 1976 wrote to memory of 2568 1976 cuasaraxuf.exe 76 PID 1976 wrote to memory of 2568 1976 cuasaraxuf.exe 76 PID 1976 wrote to memory of 2568 1976 cuasaraxuf.exe 76 PID 1976 wrote to memory of 2568 1976 cuasaraxuf.exe 76 PID 1976 wrote to memory of 1544 1976 cuasaraxuf.exe 80
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:400
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:908
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1164
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2952
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1396
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1528
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2672
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1688
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1756
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:1588
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1792
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2112
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2208
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2740
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2796
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:388
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3408
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\services.png.exe"C:\Users\Admin\AppData\Local\Temp\services.png.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Roaming\Ywdyivro\cuasaraxuf.exe"C:\Users\Admin\AppData\Roaming\Ywdyivro\cuasaraxuf.exe"3⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cmd.execmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Windows\SysWOW64\HOSTNAME.EXEhostname5⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3180
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Windows\SysWOW64\net.exenet share5⤵
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share6⤵
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp31ab4d34\UIServices.exe"C:\Users\Admin\AppData\Local\Temp\tmp31ab4d34\UIServices.exe"4⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4452 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3200 -
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
- System Location Discovery: System Language Discovery
PID:3788
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2332
-
-
C:\Windows\SysWOW64\findstr.exefindstr All6⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4768 -
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpc17f4f0a\smbhost.exe"C:\Users\Admin\AppData\Local\Temp\tmpc17f4f0a\smbhost.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5036 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4848 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵PID:3700
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵PID:4868
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
PID:4492
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:2940
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
PID:748
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
PID:4808
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
PID:1272
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Power Settings
PID:3880
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Power Settings
PID:3180
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Power Settings
PID:264
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Power Settings
PID:4396
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe5⤵PID:984
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"5⤵
- Launches sc.exe
PID:2140
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"5⤵
- Launches sc.exe
PID:4988
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:4776
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"5⤵
- Launches sc.exe
PID:4152 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\tmpc17f4f0a\smbhost.exe"5⤵PID:4588
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4796
-
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 36⤵PID:4248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp4a7a7ea4\SearchUI.exe"C:\Users\Admin\AppData\Local\Temp\tmp4a7a7ea4\SearchUI.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5052
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6e5bd2b1.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3612
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3800
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3896
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:3996
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4084
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3928
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:2524
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3560
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:536
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3884
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2420
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:1276
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2568
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:1544
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1624
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4760
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
PID:380
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:3200 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1524 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:4196
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4492
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:2996
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:5092
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:1340 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1120
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:3700
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:2248 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3052
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:404 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1592
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:1648 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3568
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:880 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1936
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:2532 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2264
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:1644
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:4396
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵
- Modifies data under HKEY_USERS
PID:4356
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
3System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
170KB
MD54376ea4b5ba0f8a061dc18342267e85c
SHA18d99fa9673835644c641ae4533f005dca4522f6c
SHA2566508dd74c69d399050b07256b4b25cd66cfd774848d55fe330a9d77ad09ce03f
SHA51224811d6dd05df0000b5d0948a833c49ef32a7e5fc3a5cab6c61e9331b6966026f03254eb1a8a9945e8a4e43d1e38bdebed2ec0e8337873de3386c4c4b5bde0a6
-
Filesize
17KB
MD5d72791d9eb757581772716a7573c4a4c
SHA18fa5d920023a9ff0b5329fd605d4b176783cc32d
SHA256b87870c36a1c770960979d8958aeb12c0537b5287bd420555931e6f4a28bbebf
SHA512b9a6c55c9fdc85e63e7228dfe260993f45cb492bbca6c90beb2c9e9f31e54406d7774292a4c19b7b12514d688bec41cf19c60a75ce16703158bf0edac3013563
-
Filesize
203B
MD52710fbc20bb7d992f610d3c7679d75a3
SHA17525e2d94e2e5ee4faac7f24b3ecd533fd6f8b2b
SHA256814d0297eccc172950e134fb763991e2b38bca3ceb5a7bb579c0375ac5fdc766
SHA512e0db3c0daedcfb9915b4c8a81e366e3612feee903c0ac59ea4fd8dcbfd743630917c025b662207a9026a0800890d98eeb5be22b1baa77e499f613a3568408411
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
625KB
MD5eccf28d7e5ccec24119b88edd160f8f4
SHA198509587a3d37a20b56b50fd57f823a1691a034c
SHA256820c83c0533cfce2928e29edeaf6c255bc19ac9718b25a5656d99ffac30a03d6
SHA512c1c94bbb781625b2317f0a8178d3a10d891fb71bca8f82cd831c484e8ab125301b82a14fe2ff070dc99a496cc00234300fa5536401018c40d49d44ae89409670
-
Filesize
5.3MB
MD5b7c617a44000e6e30462ffdd5a27ba4f
SHA1dffbd2089913059c730f751c9349d98dbc5e4f3f
SHA256f2b0f9d4f4109891d7a92f3c9e22c0fb748d36bf564eebf74a0055056e307b45
SHA51274fbc1b3ebd412c501b787974a0a7b597934accfb2eb2f47ae697bbb93db2de6824ae4cae3cb2b0783b592b4337d3eebce1a4748201653a143d326a238612181
-
C:\Users\Admin\AppData\Local\a7ab6012033be9ffc0c60b58a45c8fc0\Admin@BRWCNDMR_en-US\System\Process.txt
Filesize4KB
MD5148af5b8a997d21d331477703890be20
SHA1d700f6331358703d1e03fb4dc42ca01de8dd9165
SHA2563c28e7da18aa32d75dbd58f14e99a8ea6e1274adfe4fd197b9374e9492adde5a
SHA512e4de9ed4bd098f5dada8dec42170e95d4d6c26cf83c99f2ca6a8a4b85b85ba4d21b77bfdc6abd0df97e7a23279e8a8ac3dc031d4ff9c4d29cb40fa71a4d173b7
-
Filesize
4B
MD55bd844f11fa520d54fa5edec06ea2507
SHA12c53c377c20a3f2c14b79f7bf32b179f57e39085
SHA25614b2f094410528924d7d11ecfcd8ac7b9b5ed956511c34972ed397891cae48c0
SHA5121a503d4204dd9a76270eb001da90e02f71319d517051d9868b5e0d748c26e8c5d092d1c86bbaacd6e63fc1aed2f68d60e531b5033c17bba12241286fe096f103
-
Filesize
2KB
MD5f1f13c2726af7665c01be1a420e462ce
SHA1622d25501eacaf724e312f9f873aa53c39d670e4
SHA25616c1fdcb727b8d616c8904d8adf807dd5d57f3dcbdb305818571b7f7c6691eda
SHA512d6d0d2aa30050b32d62a2cd68eb9cc14a610d6f89b2bb1c07f9237783fca7df3f12410b65a3aa54b49c6cb9a1770a5fb2a5e6f2b955099a1ca9fd16c8ca19f6b
-
Filesize
606KB
MD595c00ca3f56705565e46d8aa91137b9e
SHA11a7be62ed39ccca69de539e9c98e1ce38840b32e
SHA256f71ccfbdd38c899168f368cb4252cf54f1315b6e1e45262a58c27e3652d58371
SHA512fee9c42acda2b5cf0b8e97a00bc1a87001152342dac926cfcea70f7e11123e766a048a91c42bff21ac2f6352be4d527a8784874c21dfad43c6811e833f420033
-
Filesize
170KB
MD5b6c3931dcfff308ef9142990c3a5eed2
SHA1bc40d7c8997595ff29d1d3a94a9ab89fa42c9403
SHA256322751f85aac92d0eefa78ce9522322d2b9a2dafc10b21dfbe7b3b453f8cb25e
SHA512b31e52d53c64b36809db865cf4a05a5a04cdd9adb3314e87399e39e4f00c15c74555ae6c9b5f9cffb09e4608aa5f7605bfcf84ddc556b8e74960e36005c3d60e
-
Filesize
264KB
MD52a7cf6950a8cd47471b283c83ff86802
SHA1177711223ab288ea4fa44cc85039a22250681112
SHA256280a392fc0521f7a3cd284bc2d6bbc44f27a3fdabb639b5b54363a9cc4f85fe3
SHA5129931a4a1143aa750eac57cdfd433dfde7404b17e9b31922a7306fed527b0cc483fbbdadb1b67c56170d5585474cdf7ac2726246480338a89904a422b41787b87
-
Filesize
3KB
MD52082b195c152af46507ecfa80955b64b
SHA1ac4164f48a10fdc59e8249f98be3771a0186eee6
SHA2562534e6e3246d38c1aaeefbb72beed327e4cd430432293b508dcc23404e15eeae
SHA5123636baebbd311b2e3f144dfe1c42ea6e4509cfe27251bf4efa96fc12f16e8ac6ee32f0239955a7f36b1bd7f53df35ec7758390fb20e4912ae747db3a2e11bf32