Analysis
-
max time kernel
119s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2025, 22:32 UTC
Static task
static1
Behavioral task
behavioral1
Sample
3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe
Resource
win10v2004-20250129-en
General
-
Target
3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe
-
Size
212KB
-
MD5
9cb27937919a2c791fc108ceda0d6de0
-
SHA1
553703c7e64b4871751273ae77d3a20d96443c41
-
SHA256
3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf
-
SHA512
4fd9bf9b0a22da07503c2211b65f6c65304097a3fe6ad58451da06d374ebc9d84feeea28862b32a9f69cd28d5f0c6c08a9562dd4b2365cdf22b536d52ce5ca5f
-
SSDEEP
3072:c4/Wd8bsXQJl5v1l83PAUKpHqzQMyU6x2cgMRRvzcuNj5hDpqkoC:c4/23XQJ8IUKpHIQMyUpPMRRz1LPoC
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe:*:enabled:@shell32.dll,-1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe:*:Enabled:ipsec" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Sality family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Windows security bypass 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Windows security modification 2 TTPs 7 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win32SystemFile = "C:\\MSystem.exe" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftPCHealth = "C:\\Windows\\System32\\PCHealth.exe" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Application Installer = "C:\\Windows\\Installer\\Installer.exe" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\O: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\R: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\X: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\G: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\L: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\M: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\Q: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\T: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\Y: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\Z: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\I: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\N: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\P: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\U: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\H: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\J: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\S: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\V: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\W: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened (read-only) \??\E: 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification F:\autorun.inf 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\PCHealth.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\Windows\SysWOW64\PCHealth.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
resource yara_rule behavioral2/memory/4548-8-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-12-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-15-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-17-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-16-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-14-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-38-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-13-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-10-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-11-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-41-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-42-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-43-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-44-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-45-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-47-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-48-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-49-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-50-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-57-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-58-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-60-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-63-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-66-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-68-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-70-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-72-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-74-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-76-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-78-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-81-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-82-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-84-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-86-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-100-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-103-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-104-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-106-0x0000000002F80000-0x000000000400E000-memory.dmp upx behavioral2/memory/4548-114-0x0000000002F80000-0x000000000400E000-memory.dmp upx -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZFM.EXE 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\7-ZIP\UNINSTALL.EXE 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7Z.EXE 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZG.EXE 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Installer\Installer.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File opened for modification C:\Windows\SYSTEM.INI 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe File created C:\Windows\Installer\Installer.exe 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe Token: SeDebugPrivilege 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4548 wrote to memory of 620 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 5 PID 4548 wrote to memory of 620 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 5 PID 4548 wrote to memory of 620 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 5 PID 4548 wrote to memory of 620 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 5 PID 4548 wrote to memory of 620 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 5 PID 4548 wrote to memory of 620 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 5 PID 4548 wrote to memory of 676 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 7 PID 4548 wrote to memory of 676 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 7 PID 4548 wrote to memory of 676 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 7 PID 4548 wrote to memory of 676 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 7 PID 4548 wrote to memory of 676 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 7 PID 4548 wrote to memory of 676 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 7 PID 4548 wrote to memory of 772 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 8 PID 4548 wrote to memory of 772 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 8 PID 4548 wrote to memory of 772 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 8 PID 4548 wrote to memory of 772 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 8 PID 4548 wrote to memory of 772 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 8 PID 4548 wrote to memory of 772 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 8 PID 4548 wrote to memory of 784 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 9 PID 4548 wrote to memory of 784 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 9 PID 4548 wrote to memory of 784 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 9 PID 4548 wrote to memory of 784 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 9 PID 4548 wrote to memory of 784 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 9 PID 4548 wrote to memory of 784 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 9 PID 4548 wrote to memory of 788 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 10 PID 4548 wrote to memory of 788 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 10 PID 4548 wrote to memory of 788 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 10 PID 4548 wrote to memory of 788 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 10 PID 4548 wrote to memory of 788 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 10 PID 4548 wrote to memory of 788 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 10 PID 4548 wrote to memory of 896 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 11 PID 4548 wrote to memory of 896 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 11 PID 4548 wrote to memory of 896 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 11 PID 4548 wrote to memory of 896 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 11 PID 4548 wrote to memory of 896 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 11 PID 4548 wrote to memory of 896 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 11 PID 4548 wrote to memory of 952 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 12 PID 4548 wrote to memory of 952 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 12 PID 4548 wrote to memory of 952 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 12 PID 4548 wrote to memory of 952 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 12 PID 4548 wrote to memory of 952 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 12 PID 4548 wrote to memory of 952 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 12 PID 4548 wrote to memory of 64 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 13 PID 4548 wrote to memory of 64 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 13 PID 4548 wrote to memory of 64 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 13 PID 4548 wrote to memory of 64 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 13 PID 4548 wrote to memory of 64 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 13 PID 4548 wrote to memory of 64 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 13 PID 4548 wrote to memory of 736 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 14 PID 4548 wrote to memory of 736 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 14 PID 4548 wrote to memory of 736 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 14 PID 4548 wrote to memory of 736 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 14 PID 4548 wrote to memory of 736 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 14 PID 4548 wrote to memory of 736 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 14 PID 4548 wrote to memory of 948 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 15 PID 4548 wrote to memory of 948 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 15 PID 4548 wrote to memory of 948 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 15 PID 4548 wrote to memory of 948 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 15 PID 4548 wrote to memory of 948 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 15 PID 4548 wrote to memory of 948 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 15 PID 4548 wrote to memory of 512 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 16 PID 4548 wrote to memory of 512 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 16 PID 4548 wrote to memory of 512 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 16 PID 4548 wrote to memory of 512 4548 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe 16 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:788
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:64
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:772
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2912
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3768
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3856
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3920
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4016
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4200
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2300
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:5004
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3736
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:5044
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:4520
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:4060
-
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider2⤵PID:2208
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3528
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4600
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:512
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1136
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2972
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:3428
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1152
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1176
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1408
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2656
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1640
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1976
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2064
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2168
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2268
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2704
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3352
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe"C:\Users\Admin\AppData\Local\Temp\3703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4548
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4976
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2576
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:3160
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4928
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:1404
Network
-
Remote address:8.8.8.8:53Requestilo.brenz.plIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request66.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestant.trenz.plIN AResponse
-
Remote address:8.8.8.8:53Request212.20.149.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.42.69.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request166.190.18.2.in-addr.arpaIN PTRResponse166.190.18.2.in-addr.arpaIN PTRa2-18-190-166deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestilo.brenz.plIN AResponse
-
Remote address:8.8.8.8:53Requestant.trenz.plIN AResponse
-
Remote address:8.8.8.8:53Requesthywawu.comIN AResponse
-
Remote address:8.8.8.8:53Requestyeyeeu.comIN AResponse
-
Remote address:8.8.8.8:53Requestkxynyq.comIN AResponse
-
Remote address:8.8.8.8:53Requesthmmsbh.comIN AResponse
-
Remote address:8.8.8.8:53Requestxuatju.comIN AResponse
-
Remote address:8.8.8.8:53Requestauuqac.comIN AResponse
-
Remote address:8.8.8.8:53Requestqcbtek.comIN AResponse
-
Remote address:8.8.8.8:53Requestumkfvh.comIN AResponse
-
Remote address:8.8.8.8:53Requestlneiaw.comIN AResponse
-
Remote address:8.8.8.8:53Requestsytaus.comIN AResponse
-
Remote address:8.8.8.8:53Requestozyapy.comIN AResponse
-
Remote address:8.8.8.8:53Requestnzfhke.comIN AResponse
-
Remote address:8.8.8.8:53Requestzoqzeo.comIN AResponse
-
Remote address:8.8.8.8:53Requestqumbxt.comIN AResponse
-
Remote address:8.8.8.8:53Requestwjetqm.comIN AResponse
-
Remote address:8.8.8.8:53Requesteqhimm.comIN AResponse
-
Remote address:8.8.8.8:53Requestzszcyc.comIN AResponse
-
Remote address:8.8.8.8:53Requestaoueva.comIN AResponse
-
Remote address:8.8.8.8:53Requestydrjyc.comIN AResponse
-
Remote address:8.8.8.8:53Requestrbcoqi.comIN AResponse
-
Remote address:8.8.8.8:53Requestuwzjxk.comIN AResponse
-
Remote address:8.8.8.8:53Requestswnsmh.comIN AResponse
-
Remote address:8.8.8.8:53Requestkxwdsf.comIN AResponse
-
Remote address:8.8.8.8:53Requestfoghvz.comIN AResponse
-
Remote address:8.8.8.8:53Requestmbdtuv.comIN AResponse
-
Remote address:8.8.8.8:53Requestbseyif.comIN AResponse
-
Remote address:8.8.8.8:53Requestriluqe.comIN AResponse
-
Remote address:8.8.8.8:53Requestnoulty.comIN AResponse
-
Remote address:8.8.8.8:53Requestuyaaoo.comIN AResponse
-
Remote address:8.8.8.8:53Requestxozuxd.comIN AResponse
-
Remote address:8.8.8.8:53Requestoqvteb.comIN AResponse
-
Remote address:8.8.8.8:53Requestlugkyn.comIN AResponse
-
Remote address:8.8.8.8:53Requestlugkyn.comIN AResponse
-
Remote address:8.8.8.8:53Requestvrboce.comIN AResponse
-
Remote address:8.8.8.8:53Requestvrboce.comIN AResponse
-
Remote address:8.8.8.8:53Requestlohzgw.comIN AResponse
-
Remote address:8.8.8.8:53Requestlohzgw.comIN AResponse
-
Remote address:8.8.8.8:53Requestliyael.comIN AResponse
-
Remote address:8.8.8.8:53Requestliyael.comIN AResponse
-
Remote address:8.8.8.8:53Requestvcyyyz.comIN AResponse
-
Remote address:8.8.8.8:53Requestvcyyyz.comIN AResponse
-
Remote address:8.8.8.8:53Requestyviljz.comIN AResponse
-
Remote address:8.8.8.8:53Requestyviljz.comIN AResponse
-
Remote address:8.8.8.8:53Requestosmiti.comIN AResponse
-
Remote address:8.8.8.8:53Requestfuonpf.comIN AResponse
-
Remote address:8.8.8.8:53Requestmykdim.comIN AResponse
-
Remote address:8.8.8.8:53Requestmykdim.comIN AResponse
-
Remote address:8.8.8.8:53Requestaiuxah.comIN AResponse
-
Remote address:8.8.8.8:53Requestaiuxah.comIN AResponse
-
Remote address:8.8.8.8:53Requestzqiqiy.comIN AResponse
-
Remote address:8.8.8.8:53Requestzqiqiy.comIN AResponse
-
Remote address:8.8.8.8:53Requestkouvir.comIN AResponse
-
Remote address:8.8.8.8:53Requestkouvir.comIN AResponse
-
Remote address:8.8.8.8:53Requestepshrd.comIN AResponse
-
Remote address:8.8.8.8:53Requestepshrd.comIN AResponse
-
Remote address:8.8.8.8:53Requestuseyui.comIN AResponse
-
Remote address:8.8.8.8:53Requestuseyui.comIN AResponse
-
Remote address:8.8.8.8:53Requestzmbhtg.comIN AResponse
-
Remote address:8.8.8.8:53Requestzmbhtg.comIN AResponse
-
Remote address:8.8.8.8:53Requestrpeksm.comIN AResponse
-
Remote address:8.8.8.8:53Requestrpeksm.comIN AResponse
-
Remote address:8.8.8.8:53Requestsobmkp.comIN AResponse
-
Remote address:8.8.8.8:53Requestloucya.comIN AResponse
-
Remote address:8.8.8.8:53Requestloucya.comIN AResponse
-
Remote address:8.8.8.8:53Requestabyxpy.comIN AResponse
-
Remote address:8.8.8.8:53Requestabyxpy.comIN AResponse
-
Remote address:8.8.8.8:53Requestlyjnee.comIN AResponse
-
Remote address:8.8.8.8:53Requestlyjnee.comIN AResponse
-
Remote address:8.8.8.8:53Requestxyzecu.comIN AResponse
-
Remote address:8.8.8.8:53Requestxyzecu.comIN AResponse
-
Remote address:8.8.8.8:53Requestooyosg.comIN AResponse
-
Remote address:8.8.8.8:53Requestooyosg.comIN AResponse
-
Remote address:8.8.8.8:53Requesteaefpd.comIN AResponse
-
Remote address:8.8.8.8:53Requesteaefpd.comIN AResponse
-
Remote address:8.8.8.8:53Requestvlvbdi.comIN AResponse
-
Remote address:8.8.8.8:53Requestvlvbdi.comIN AResponse
-
Remote address:8.8.8.8:53Requestkwvrai.comIN AResponse
-
Remote address:8.8.8.8:53Requestkwvrai.comIN AResponse
-
Remote address:8.8.8.8:53Requestwvgqyg.comIN AResponse
-
Remote address:8.8.8.8:53Requestwvgqyg.comIN AResponse
-
Remote address:8.8.8.8:53Requestiesavo.comIN AResponse
-
Remote address:8.8.8.8:53Requestiesavo.comIN AResponse
-
Remote address:8.8.8.8:53Requestxaovma.comIN AResponse
-
Remote address:8.8.8.8:53Requestxaovma.comIN AResponse
-
Remote address:8.8.8.8:53Requestudbxqh.comIN AResponse
-
Remote address:8.8.8.8:53Requestudbxqh.comIN AResponse
-
Remote address:8.8.8.8:53Requestcwilre.comIN AResponse
-
Remote address:8.8.8.8:53Requestcwilre.comIN AResponse
-
Remote address:8.8.8.8:53Requestiucoit.comIN AResponse
-
Remote address:8.8.8.8:53Requestiucoit.comIN AResponse
-
Remote address:8.8.8.8:53Requestbohhyj.comIN AResponse
-
Remote address:8.8.8.8:53Requestbohhyj.comIN AResponse
-
Remote address:8.8.8.8:53Requestyutwyp.comIN AResponse
-
Remote address:8.8.8.8:53Requestyutwyp.comIN AResponse
-
Remote address:8.8.8.8:53Requestcpfquv.comIN AResponse
-
Remote address:8.8.8.8:53Requestcpfquv.comIN AResponse
-
Remote address:8.8.8.8:53Requestaeboym.comIN AResponse
-
Remote address:8.8.8.8:53Requestavbwkp.comIN AResponse
-
Remote address:8.8.8.8:53Requestavbwkp.comIN AResponse
-
Remote address:8.8.8.8:53Requestqsridp.comIN AResponse
-
Remote address:8.8.8.8:53Requestqsridp.comIN AResponse
-
Remote address:8.8.8.8:53Requestkcuama.comIN AResponse
-
Remote address:8.8.8.8:53Requestkcuama.comIN AResponse
-
Remote address:8.8.8.8:53Requestxeften.comIN AResponse
-
Remote address:8.8.8.8:53Requestxeften.comIN AResponse
-
Remote address:8.8.8.8:53Requestwpenwv.comIN AResponse
-
Remote address:8.8.8.8:53Requestwpenwv.comIN AResponse
-
Remote address:8.8.8.8:53Requestwveayx.comIN AResponse
-
Remote address:8.8.8.8:53Requestwveayx.comIN AResponse
-
Remote address:8.8.8.8:53Requestsmlsyb.comIN AResponse
-
Remote address:8.8.8.8:53Requestsmlsyb.comIN AResponse
-
Remote address:8.8.8.8:53Requestukkmjt.comIN AResponse
-
Remote address:8.8.8.8:53Requestukkmjt.comIN AResponse
-
Remote address:8.8.8.8:53Requesteclqjt.comIN AResponse
-
Remote address:8.8.8.8:53Requesteclqjt.comIN AResponse
-
Remote address:8.8.8.8:53Requestxfuosu.comIN AResponse
-
Remote address:8.8.8.8:53Requestxfuosu.comIN AResponse
-
Remote address:8.8.8.8:53Requestwvetol.comIN AResponse
-
Remote address:8.8.8.8:53Requestwvetol.comIN AResponse
-
Remote address:8.8.8.8:53Requestbyqiyk.comIN AResponse
-
Remote address:8.8.8.8:53Requestbyqiyk.comIN AResponse
-
Remote address:8.8.8.8:53Requestihjnkq.comIN AResponse
-
Remote address:8.8.8.8:53Requestihjnkq.comIN AResponse
-
Remote address:8.8.8.8:53Requestdeiswn.comIN AResponse
-
Remote address:8.8.8.8:53Requestdeiswn.comIN AResponse
-
Remote address:8.8.8.8:53Requestumaosy.comIN AResponse
-
Remote address:8.8.8.8:53Requestumaosy.comIN AResponse
-
Remote address:8.8.8.8:53Requestiurksw.comIN AResponse
-
Remote address:8.8.8.8:53Requestiurksw.comIN AResponse
-
Remote address:8.8.8.8:53Requestltrmel.comIN AResponse
-
Remote address:8.8.8.8:53Requestltrmel.comIN AResponse
-
Remote address:8.8.8.8:53Requestkkxiue.comIN AResponse
-
Remote address:8.8.8.8:53Requestkkxiue.comIN AResponse
-
Remote address:8.8.8.8:53Requestxdszae.comIN AResponse
-
Remote address:8.8.8.8:53Requestxdszae.comIN AResponse
-
Remote address:8.8.8.8:53Requestwvyznc.comIN AResponse
-
Remote address:8.8.8.8:53Requestwvyznc.comIN AResponse
-
Remote address:8.8.8.8:53Requestxjothl.comIN AResponse
-
Remote address:8.8.8.8:53Requestxjothl.comIN AResponse
-
Remote address:8.8.8.8:53Requestevgxxr.comIN AResponse
-
Remote address:8.8.8.8:53Requestevgxxr.comIN AResponse
-
Remote address:8.8.8.8:53Requesttkzvmf.comIN AResponse
-
Remote address:8.8.8.8:53Requesttkzvmf.comIN AResponse
-
Remote address:8.8.8.8:53Requestxnuatz.comIN AResponse
-
Remote address:8.8.8.8:53Requestxnuatz.comIN AResponse
-
Remote address:8.8.8.8:53Requestvnhqir.comIN AResponse
-
Remote address:8.8.8.8:53Requestvnhqir.comIN AResponse
-
Remote address:8.8.8.8:53Requestibsidb.comIN AResponse
-
Remote address:8.8.8.8:53Requestibsidb.comIN AResponse
-
Remote address:8.8.8.8:53Requestkrahaa.comIN AResponse
-
Remote address:8.8.8.8:53Requestkrahaa.comIN AResponse
-
Remote address:8.8.8.8:53Requestsvbjue.comIN AResponse
-
Remote address:8.8.8.8:53Requestsvbjue.comIN AResponse
-
Remote address:8.8.8.8:53Requestotamun.comIN AResponse
-
Remote address:8.8.8.8:53Requestotamun.comIN AResponse
-
Remote address:8.8.8.8:53Requestocafsa.comIN AResponse
-
Remote address:8.8.8.8:53Requestocafsa.comIN AResponse
-
Remote address:8.8.8.8:53Requestntvmik.comIN AResponse
-
Remote address:8.8.8.8:53Requestntvmik.comIN AResponse
-
Remote address:8.8.8.8:53Requestghznoa.comIN AResponse
-
Remote address:8.8.8.8:53Requestghznoa.comIN AResponse
-
Remote address:8.8.8.8:53Requesthutuge.comIN AResponsehutuge.comIN CNAMEab.cloudflare.182682.xyzab.cloudflare.182682.xyzIN A104.19.48.236ab.cloudflare.182682.xyzIN A104.16.155.10ab.cloudflare.182682.xyzIN A198.41.209.70ab.cloudflare.182682.xyzIN A104.17.213.241ab.cloudflare.182682.xyzIN A104.17.221.248
-
Remote address:8.8.8.8:53Requesthutuge.comIN AResponsehutuge.comIN CNAMEab.cloudflare.182682.xyzab.cloudflare.182682.xyzIN A104.17.213.241ab.cloudflare.182682.xyzIN A104.17.221.248ab.cloudflare.182682.xyzIN A104.19.48.236ab.cloudflare.182682.xyzIN A104.16.155.10ab.cloudflare.182682.xyzIN A198.41.209.70
-
Remote address:8.8.8.8:53Request236.48.19.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request236.48.19.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestuqejdt.comIN AResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestilo.brenz.plIN AResponse
-
Remote address:8.8.8.8:53Requestilo.brenz.plIN AResponse
-
Remote address:8.8.8.8:53Requestant.trenz.plIN AResponse
-
Remote address:8.8.8.8:53Requestant.trenz.plIN AResponse
-
260 B 5
-
260 B 5
-
190 B 132 B 4 3
-
208 B 4
-
58 B 58 B 1 1
DNS Request
ilo.brenz.pl
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
66.160.190.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
58 B 58 B 1 1
DNS Request
ant.trenz.pl
-
72 B 146 B 1 1
DNS Request
212.20.149.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
241.42.69.40.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
166.190.18.2.in-addr.arpa
-
58 B 58 B 1 1
DNS Request
ilo.brenz.pl
-
58 B 58 B 1 1
DNS Request
ant.trenz.pl
-
56 B 129 B 1 1
DNS Request
hywawu.com
-
56 B 129 B 1 1
DNS Request
yeyeeu.com
-
56 B 129 B 1 1
DNS Request
kxynyq.com
-
56 B 129 B 1 1
DNS Request
hmmsbh.com
-
56 B 129 B 1 1
DNS Request
xuatju.com
-
56 B 129 B 1 1
DNS Request
auuqac.com
-
56 B 129 B 1 1
DNS Request
qcbtek.com
-
56 B 129 B 1 1
DNS Request
umkfvh.com
-
56 B 129 B 1 1
DNS Request
lneiaw.com
-
56 B 129 B 1 1
DNS Request
sytaus.com
-
56 B 129 B 1 1
DNS Request
ozyapy.com
-
56 B 129 B 1 1
DNS Request
nzfhke.com
-
56 B 129 B 1 1
DNS Request
zoqzeo.com
-
56 B 129 B 1 1
DNS Request
qumbxt.com
-
56 B 129 B 1 1
DNS Request
wjetqm.com
-
56 B 129 B 1 1
DNS Request
eqhimm.com
-
56 B 129 B 1 1
DNS Request
zszcyc.com
-
56 B 129 B 1 1
DNS Request
aoueva.com
-
56 B 129 B 1 1
DNS Request
ydrjyc.com
-
56 B 129 B 1 1
DNS Request
rbcoqi.com
-
56 B 129 B 1 1
DNS Request
uwzjxk.com
-
56 B 129 B 1 1
DNS Request
swnsmh.com
-
56 B 129 B 1 1
DNS Request
kxwdsf.com
-
56 B 129 B 1 1
DNS Request
foghvz.com
-
56 B 129 B 1 1
DNS Request
mbdtuv.com
-
56 B 129 B 1 1
DNS Request
bseyif.com
-
56 B 129 B 1 1
DNS Request
riluqe.com
-
56 B 129 B 1 1
DNS Request
noulty.com
-
56 B 129 B 1 1
DNS Request
uyaaoo.com
-
56 B 129 B 1 1
DNS Request
xozuxd.com
-
56 B 129 B 1 1
DNS Request
oqvteb.com
-
112 B 258 B 2 2
DNS Request
lugkyn.com
DNS Request
lugkyn.com
-
112 B 258 B 2 2
DNS Request
vrboce.com
DNS Request
vrboce.com
-
112 B 258 B 2 2
DNS Request
lohzgw.com
DNS Request
lohzgw.com
-
112 B 258 B 2 2
DNS Request
liyael.com
DNS Request
liyael.com
-
112 B 258 B 2 2
DNS Request
vcyyyz.com
DNS Request
vcyyyz.com
-
112 B 258 B 2 2
DNS Request
yviljz.com
DNS Request
yviljz.com
-
56 B 129 B 1 1
DNS Request
osmiti.com
-
56 B 129 B 1 1
DNS Request
fuonpf.com
-
112 B 258 B 2 2
DNS Request
mykdim.com
DNS Request
mykdim.com
-
112 B 258 B 2 2
DNS Request
aiuxah.com
DNS Request
aiuxah.com
-
112 B 258 B 2 2
DNS Request
zqiqiy.com
DNS Request
zqiqiy.com
-
112 B 258 B 2 2
DNS Request
kouvir.com
DNS Request
kouvir.com
-
112 B 258 B 2 2
DNS Request
epshrd.com
DNS Request
epshrd.com
-
112 B 258 B 2 2
DNS Request
useyui.com
DNS Request
useyui.com
-
112 B 258 B 2 2
DNS Request
zmbhtg.com
DNS Request
zmbhtg.com
-
112 B 258 B 2 2
DNS Request
rpeksm.com
DNS Request
rpeksm.com
-
56 B 129 B 1 1
DNS Request
sobmkp.com
-
112 B 258 B 2 2
DNS Request
loucya.com
DNS Request
loucya.com
-
112 B 258 B 2 2
DNS Request
abyxpy.com
DNS Request
abyxpy.com
-
112 B 258 B 2 2
DNS Request
lyjnee.com
DNS Request
lyjnee.com
-
112 B 258 B 2 2
DNS Request
xyzecu.com
DNS Request
xyzecu.com
-
112 B 258 B 2 2
DNS Request
ooyosg.com
DNS Request
ooyosg.com
-
112 B 258 B 2 2
DNS Request
eaefpd.com
DNS Request
eaefpd.com
-
112 B 258 B 2 2
DNS Request
vlvbdi.com
DNS Request
vlvbdi.com
-
112 B 258 B 2 2
DNS Request
kwvrai.com
DNS Request
kwvrai.com
-
112 B 258 B 2 2
DNS Request
wvgqyg.com
DNS Request
wvgqyg.com
-
112 B 258 B 2 2
DNS Request
iesavo.com
DNS Request
iesavo.com
-
112 B 258 B 2 2
DNS Request
xaovma.com
DNS Request
xaovma.com
-
112 B 258 B 2 2
DNS Request
udbxqh.com
DNS Request
udbxqh.com
-
112 B 258 B 2 2
DNS Request
cwilre.com
DNS Request
cwilre.com
-
112 B 258 B 2 2
DNS Request
iucoit.com
DNS Request
iucoit.com
-
112 B 258 B 2 2
DNS Request
bohhyj.com
DNS Request
bohhyj.com
-
112 B 258 B 2 2
DNS Request
yutwyp.com
DNS Request
yutwyp.com
-
112 B 258 B 2 2
DNS Request
cpfquv.com
DNS Request
cpfquv.com
-
56 B 129 B 1 1
DNS Request
aeboym.com
-
112 B 258 B 2 2
DNS Request
avbwkp.com
DNS Request
avbwkp.com
-
112 B 258 B 2 2
DNS Request
qsridp.com
DNS Request
qsridp.com
-
112 B 258 B 2 2
DNS Request
kcuama.com
DNS Request
kcuama.com
-
112 B 258 B 2 2
DNS Request
xeften.com
DNS Request
xeften.com
-
112 B 258 B 2 2
DNS Request
wpenwv.com
DNS Request
wpenwv.com
-
112 B 258 B 2 2
DNS Request
wveayx.com
DNS Request
wveayx.com
-
112 B 258 B 2 2
DNS Request
smlsyb.com
DNS Request
smlsyb.com
-
112 B 258 B 2 2
DNS Request
ukkmjt.com
DNS Request
ukkmjt.com
-
112 B 258 B 2 2
DNS Request
eclqjt.com
DNS Request
eclqjt.com
-
112 B 258 B 2 2
DNS Request
xfuosu.com
DNS Request
xfuosu.com
-
112 B 258 B 2 2
DNS Request
wvetol.com
DNS Request
wvetol.com
-
112 B 258 B 2 2
DNS Request
byqiyk.com
DNS Request
byqiyk.com
-
112 B 258 B 2 2
DNS Request
ihjnkq.com
DNS Request
ihjnkq.com
-
112 B 258 B 2 2
DNS Request
deiswn.com
DNS Request
deiswn.com
-
112 B 258 B 2 2
DNS Request
umaosy.com
DNS Request
umaosy.com
-
112 B 258 B 2 2
DNS Request
iurksw.com
DNS Request
iurksw.com
-
112 B 258 B 2 2
DNS Request
ltrmel.com
DNS Request
ltrmel.com
-
112 B 258 B 2 2
DNS Request
kkxiue.com
DNS Request
kkxiue.com
-
112 B 258 B 2 2
DNS Request
xdszae.com
DNS Request
xdszae.com
-
112 B 258 B 2 2
DNS Request
wvyznc.com
DNS Request
wvyznc.com
-
112 B 258 B 2 2
DNS Request
xjothl.com
DNS Request
xjothl.com
-
112 B 258 B 2 2
DNS Request
evgxxr.com
DNS Request
evgxxr.com
-
112 B 258 B 2 2
DNS Request
tkzvmf.com
DNS Request
tkzvmf.com
-
112 B 258 B 2 2
DNS Request
xnuatz.com
DNS Request
xnuatz.com
-
112 B 258 B 2 2
DNS Request
vnhqir.com
DNS Request
vnhqir.com
-
112 B 258 B 2 2
DNS Request
ibsidb.com
DNS Request
ibsidb.com
-
112 B 258 B 2 2
DNS Request
krahaa.com
DNS Request
krahaa.com
-
112 B 258 B 2 2
DNS Request
svbjue.com
DNS Request
svbjue.com
-
112 B 258 B 2 2
DNS Request
otamun.com
DNS Request
otamun.com
-
112 B 258 B 2 2
DNS Request
ocafsa.com
DNS Request
ocafsa.com
-
112 B 258 B 2 2
DNS Request
ntvmik.com
DNS Request
ntvmik.com
-
112 B 258 B 2 2
DNS Request
ghznoa.com
DNS Request
ghznoa.com
-
112 B 348 B 2 2
DNS Request
hutuge.com
DNS Request
hutuge.com
DNS Response
104.19.48.236104.16.155.10198.41.209.70104.17.213.241104.17.221.248
DNS Response
104.17.213.241104.17.221.248104.19.48.236104.16.155.10198.41.209.70
-
144 B 268 B 2 2
DNS Request
236.48.19.104.in-addr.arpa
DNS Request
236.48.19.104.in-addr.arpa
-
56 B 129 B 1 1
DNS Request
uqejdt.com
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
29.243.111.52.in-addr.arpa
-
116 B 116 B 2 2
DNS Request
ilo.brenz.pl
DNS Request
ilo.brenz.pl
-
116 B 116 B 2 2
DNS Request
ant.trenz.pl
DNS Request
ant.trenz.pl
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD59cb27937919a2c791fc108ceda0d6de0
SHA1553703c7e64b4871751273ae77d3a20d96443c41
SHA2563703bb46bea3b386482287c1d6b3c79ff4fe201ff843a804946d97f0e82b6fdf
SHA5124fd9bf9b0a22da07503c2211b65f6c65304097a3fe6ad58451da06d374ebc9d84feeea28862b32a9f69cd28d5f0c6c08a9562dd4b2365cdf22b536d52ce5ca5f
-
Filesize
127KB
MD5d450881e3a688d324aa9ac1f38c01422
SHA115588a6f8172c5c1ff116ff2ce03fe7e1f4ca9b9
SHA25694c18efd5515a3b3b63cd5c160230896f349600e3bd8c51234ce8263d03eb170
SHA512193238542f8a14d1c7efa6bc1934cd968959197c5da91ff6eecb3e6ce8f1ec4bdc1aad5f3900ff68c6e146279cd0b60c201d7dc37e0163f7fc2003080f02ee60