Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 03:12
Behavioral task
behavioral1
Sample
46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe
Resource
win10v2004-20250129-en
General
-
Target
46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe
-
Size
15.7MB
-
MD5
69b41cf98c265e6dcc00161fd0f300c0
-
SHA1
62a9fa9eda1f95cbcd14b7fee4c2f7213d6d1f7b
-
SHA256
46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48
-
SHA512
0caee441fdc2835fd732780fbf2a6a11101e025d140b14c7f794d7f3e99b1c33f74916b05d49468d64bf06c312b651f2829cff560690f484de315a5dab9bef21
-
SSDEEP
196608:da9+6Y7SOEibgRrwo8NUu7gh1a9+6Y7SOEibgRrwo8NUu7ghvyHFkr23LO:dFgRrwo8N41FgRrwo8N4vyC
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/2688-0-0x0000000000400000-0x0000000000613000-memory.dmp family_blackmoon behavioral2/files/0x0001000000021562-67.dat family_blackmoon -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Xmrig family
-
XMRig Miner payload 17 IoCs
resource yara_rule behavioral2/memory/2688-0-0x0000000000400000-0x0000000000613000-memory.dmp xmrig behavioral2/files/0x000b000000023b8f-7.dat xmrig behavioral2/files/0x0001000000021562-67.dat xmrig behavioral2/memory/3600-299-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-387-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-388-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-391-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-393-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-412-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-413-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-422-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-423-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-525-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-526-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-527-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-528-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig behavioral2/memory/3600-529-0x0000000000400000-0x00000000004DA000-memory.dmp xmrig -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Tray.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Tray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Executes dropped EXE 1 IoCs
pid Process 3600 svchost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\quickassist.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\sort.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\IME\SHARED\imecfmui.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\wbem\WmiPrvSE.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\hdwwiz.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\TpmTool.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\TRACERT.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\wsmprovhost.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\control.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\mshta.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\netbtugc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\schtasks.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\CameraSettingsUIHost.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\dllhost.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\findstr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\Fondue.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\ntprint.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\Com\MigRegDB.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\Dism\DismHost.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\compact.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\fontview.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\mmc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\relog.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\replace.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\secinit.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\verclsid.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\IME\SHARED\IMEWDBLD.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\convert.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\InstallShield\setup.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\DevicePairingWizard.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\ieUnatt.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\RdpSa.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\wbem\WMIC.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\auditpol.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\logman.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\mstsc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\mtstocom.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\ROUTE.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\systeminfo.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\chcp.com 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\HOSTNAME.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\lodctr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\mspaint.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\SystemPropertiesAdvanced.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\wlanext.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\fontdrvhost.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\perfmon.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\sfc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\odbcconf.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\attrib.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\bthudtask.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\makecab.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\regedt32.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\tar.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\wowreg32.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\at.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\diskperf.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\msfeedssync.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\msinfo32.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\rasphone.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\ThumbnailExtractionHost.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\tzutil.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SysWOW64\CredentialUIBroker.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-1000-0000000FF1CE}\misc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\AddOut.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\accicons.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\outicon.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-006E-0409-1000-0000000FF1CE}\misc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Internet Explorer\ExtExport.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\SmartTagInstall.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-us\pages\wefgalleryonenoteinsertwinrt.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\xlicons.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\license.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\3DViewer.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\mosaic_window.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\create_stream.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Internet Explorer\iexplore.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\WebviewOffline.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_view.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\offset_window.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmadminicon.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\view.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Program Files\Internet Explorer\ieinstal.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-s..artcard-tpm-manager_31bf3856ad364e35_10.0.19041.746_none_790f12933fbf7e0d\immersivetpmvscmgrsvr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-uso-dtuhandler_31bf3856ad364e35_10.0.19041.153_none_c0c4ee134c2535a0\r\DTUHandler.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.19041.1266_none_777e4c5802d14c18\common-button-template.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_netfx4-globalsansserifcf_b03f5f7f11d50a3a_4.0.15805.110_none_ce1e447583079efb\GlobalSansSerif.CompositeFont 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-dlna-mdeserver_31bf3856ad364e35_10.0.19041.746_none_b4017de081b11e02\r\MDEServer.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..eldebugger-recorder_31bf3856ad364e35_10.0.19041.746_none_425d54d86cc1f3e2\f\tttracer.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-eudcedit_31bf3856ad364e35_10.0.19041.1_none_19de3c7b933c6faf\eudcedit.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-defrag-adminui_31bf3856ad364e35_10.0.19041.84_none_9b0dd648f2c31f16\dfrgui.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..eldebugger-recorder_31bf3856ad364e35_10.0.19041.1_none_24a9c1e1e1b0f793\ttdinject.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.19041.117_none_e0d32848ac56114e\oobewelcome-main.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..osoftedge.resources_31bf3856ad364e35_10.0.19041.1_de-de_fa3317ce4cfa58b0\pdferrorneedcredentials.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_10.0.19041.1_es-es_12451df02dbd2879\403-4.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-certutil_31bf3856ad364e35_10.0.19041.1_none_6b761570d2ba1947\certutil.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-wininit_31bf3856ad364e35_10.0.19041.1202_none_a5b2e5b8b986fe3d\wininit.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_netfx4-mscorsvw_exe_b03f5f7f11d50a3a_4.0.15805.0_none_7d38f956251354fe\mscorsvw.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-winre-recoverytools_31bf3856ad364e35_10.0.19041.746_none_bd9bc99304595128\r\ReAgentc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-appidcore_31bf3856ad364e35_10.0.19041.1_none_e4c1e71455c2721c\appidtel.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-cleanmgr_31bf3856ad364e35_10.0.19041.1266_none_e20a09e712bd275c\cleanmgr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-rasautodial_31bf3856ad364e35_10.0.19041.546_none_edd345b6c42269da\r\rasautou.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..ng-server-isolation_31bf3856ad364e35_10.0.19041.746_none_7aa85dbabd7172c7\f\PrintIsolationHost.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-regini_31bf3856ad364e35_10.0.19041.1_none_c24749f2592e69f9\regini.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\x86_microsoft-windows-photoscreensaver_31bf3856ad364e35_10.0.19041.746_none_eda92e20fee7d318\f\PhotoScreensaver.scr 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-o..documents.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_f26c7822f88d3a15\OOBE_HELP_Opt_in_Details.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\XBox.TCUI.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\iisreset.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..osoftedge.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_d1f435fdf91e63d5\dnserror.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_b4fc93ef208f3edb\401-1.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\f\HvsiSettingsWorker.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ncsiuwpapp.appxmain_31bf3856ad364e35_10.0.19041.1_none_a5a5fe7757df26e3\NcsiUwpApp.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..onwakesettingflyout_31bf3856ad364e35_10.0.19041.1_none_623e57cb80e184b5\PasswordOnWakeSettingFlyout.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..al-chinese-moimeexe_31bf3856ad364e35_10.0.19041.1_none_e73c658ee671e530\ChtIME.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-errorreportingcore_31bf3856ad364e35_10.0.19041.1081_none_955497efbb030cb9\wermgr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.19041.117_none_e0d32848ac56114e\unifiedEnrollmentDiscoveryError.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\ImeBroker.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-certutil_31bf3856ad364e35_10.0.19041.746_none_9dd2fd0bc68c998c\certutil.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-deployment_31bf3856ad364e35_10.0.19041.746_none_e43cebe9807e08e3\f\setupugc.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.19041.1266_none_777e4c5802d14c18\oobeoemregistration-main.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\acrotextextractor.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_regbrowsers.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\aspnet_compiler.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..osoftedge.resources_31bf3856ad364e35_10.0.19041.1_es-es_a2ef4aab3bff561a\pdferror.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..lications-clientsku_31bf3856ad364e35_10.0.19041.1266_none_93a0f3defb54e912\rdpinit.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-winlogon-tools_31bf3856ad364e35_10.0.19041.746_none_726cc4a1ebcb1c1e\wlrmdr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoftwindows-undockeddevkit.appxmain_31bf3856ad364e35_10.0.19041.488_none_7201e1dc944d1765\r\UndockedDevKit.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-wmi-core_31bf3856ad364e35_10.0.19041.1081_none_2e31e8eed4b770c3\f\WmiApSrv.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\msil_multipoint-wmsdashboard_31bf3856ad364e35_10.0.19041.1_none_061d84508b376f80\WmsDashboard.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..nagement-appvclient_31bf3856ad364e35_10.0.19041.264_none_aa5417fd2708544d\r\AppVDllSurrogate.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-appx-deployment-server_31bf3856ad364e35_10.0.19041.1288_none_d616f4b76bd7b8a2\f\CustomInstallExec.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-security-webauth_31bf3856ad364e35_10.0.19041.1_none_e1940364964a9f22\AuthHost.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..osoftedge.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_cd2d1cde69f392b4\repost.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-dusm_31bf3856ad364e35_10.0.19041.1_none_625cda72b86ccf7e\dusmtask.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-wmi-core-providerhost_31bf3856ad364e35_10.0.19041.546_none_ee5c058bea34543e\r\WmiPrvSE.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mapi_31bf3856ad364e35_10.0.19041.423_none_93adcfb5ace23a89\f\fixmapi.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_10.0.19041.1_en-us_1279c10c2d9636d4\403-3.htm 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-oobe-machine_31bf3856ad364e35_10.0.19041.1266_none_82441dbab862ff6a\f\msoobe.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..wsupdateclient-core_31bf3856ad364e35_10.0.19041.1288_none_23aa03725ec9354a\r\wuauclt.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_openssh-common-components-onecore_31bf3856ad364e35_10.0.19041.84_none_b4499a04dddcc22e\scp.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\it-IT\assets\ErrorPages\pdferrorquitapplicationguard.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-commandprompt_31bf3856ad364e35_10.0.19041.746_none_69061189792bce34\r\cmd.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-speechcommonnoia64_31bf3856ad364e35_10.0.19041.1_none_b89a948362edb3e7\sapisvr.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-newdev_31bf3856ad364e35_10.0.19041.1202_none_908b22903a403149\newdev.exe 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-e..ortingcompatibility_31bf3856ad364e35_10.0.19041.1081_none_7dd23580df04442f\f\DWWIN.EXE 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-c..riencehost.appxmain_31bf3856ad364e35_10.0.19041.1266_none_777e4c5802d14c18\oobezdp-main.html 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2688 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Token: 33 2688 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Token: SeIncBasePriorityPrivilege 2688 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Token: SeIncBasePriorityPrivilege 3600 svchost.exe Token: SeLockMemoryPrivilege 3600 svchost.exe Token: SeLockMemoryPrivilege 3600 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2688 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2688 wrote to memory of 3600 2688 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe 86 PID 2688 wrote to memory of 3600 2688 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe 86 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe"C:\Users\Admin\AppData\Local\Temp\46620f13f3a79843ed2f251a4e2346769e0d5be56ce0f03ecd1300962710ad48.exe"1⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2688 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.8MB
MD550ef4fb672a02e6baecdc5a8e53d499c
SHA12e74872fb8170aeaa1096b9f4ee4bb37b8c37db7
SHA25653c51870e967307700e3972c1c16116516ee90a566dee5b7888818f4828f4b27
SHA512c2b78179a42a5b9018df420cab3dcc15faee52f5f1a633fd3d518386f5498927390a0cef11e233af80901e4f6762f24bc9ca0eb9cc180e12cca403bca2c2f56e
-
Filesize
1KB
MD588c5c5706d2e237422eda18490dc6a59
SHA1bb8d12375f6b995301e756de2ef4fa3a3f6efd39
SHA2564756a234ed3d61fe187d9b6140792e54e7b757545edff82df594a507e528ed8e
SHA512a417270a0d46de5bb06a621c0383c893042a506524713f89ba55567df6e5c3ac8b198bce5a0300ec6e716897bb53fd3e8289a51240157dc743004517673d4ab7
-
Filesize
833KB
MD54a87a4d6677558706db4afaeeeb58d20
SHA17738dc6a459f8415f0265d36c626b48202cd6764
SHA25608b55f9b7dafc53dfc43f7f70cdd7048d231767745b76dc4474370fb323d7ae7
SHA512bedd8ed4975df3fcd4a0f575d6f38e3841e7a4b771baac4f72033102a070818b8539eb101c50563d89d4f3454899a1cedb33047b02e421256dedf9aaf258b594