Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2025, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe
Resource
win7-20240903-en
General
-
Target
2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe
-
Size
772KB
-
MD5
11efce84e0a22a7cf2cc37e4d70b9d12
-
SHA1
fdf14b95fe44f020456008604cd31536e423b72b
-
SHA256
2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475
-
SHA512
a3ff129fc550c5bc126984d14f0c7cbea78b466636be8608004a30a22d5d179d2e52301015b3e7d9df6fe3455fa7c27fc863e927f1fda4e00b90bee7482c8c15
-
SSDEEP
12288:gmhjJdUlzn3DSudvsh8Awf3XFaZmBITVJPtSrE37yG2LmxCiZ:Xh1alj3DSudvGM3MXTVhtSQWGtx3Z
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-70482961-775596374-3727440602-1000\Control Panel\International\Geo\Nation 2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe Key value queried \REGISTRY\USER\S-1-5-21-70482961-775596374-3727440602-1000\Control Panel\International\Geo\Nation quymtwmnbe.exe -
Executes dropped EXE 4 IoCs
pid Process 4452 quymtwmnbe.exe 2884 dddnutzwcp.exe 2392 2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe 3852 bindsvc.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\System32\bindsvc.exe dddnutzwcp.exe File created C:\Windows\SysWOW64\wideshut.exe dddnutzwcp.exe File opened for modification C:\Windows\SysWOW64\wideshut.exe dddnutzwcp.exe File created C:\Windows\SysWOW64\wimsvc.exe dddnutzwcp.exe File created C:\Windows\SysWOW64\racfg.exe dddnutzwcp.exe File created C:\Windows\SysWOW64\bindsvc.exe dddnutzwcp.exe File created C:\Windows\system32\msfte.dll dddnutzwcp.exe File created C:\Windows\system32\oci.dll dddnutzwcp.exe -
resource yara_rule behavioral2/files/0x000b000000023b76-13.dat upx behavioral2/memory/2884-14-0x0000000000690000-0x000000000080A000-memory.dmp upx behavioral2/memory/2884-168-0x0000000000690000-0x000000000080A000-memory.dmp upx behavioral2/memory/2884-177-0x0000000000690000-0x000000000080A000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1808 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quymtwmnbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddnutzwcp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bindsvc.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000009a42c57d4677db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-178 = "OpenDocument Presentation" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-170 = "Microsoft PowerPoint 97-2003 Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-113 = "Microsoft Excel Binary Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-915 = "XHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9923 = "Windows Media playlist" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007701467e4677db01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000080a7107f4677db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\wshext.dll,-4802 = "VBScript Script File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-105 = "Windows PowerShell XML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-125 = "Microsoft Word Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E46787A1-4629-4423-A693-BE1F003B2742} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007da62f7f4677db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-184 = "Microsoft PowerPoint Macro-Enabled Design Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000507da17d4677db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000000d6c347f4677db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-175 = "Microsoft PowerPoint Slide Show" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000096b89c7d4677db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000b4f2b67d4677db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-24585 = "Cascading Style Sheet Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9908 = "Wave Sound" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2884 dddnutzwcp.exe 2884 dddnutzwcp.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: 33 4332 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4332 SearchIndexer.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1860 wrote to memory of 4452 1860 2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe 86 PID 1860 wrote to memory of 4452 1860 2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe 86 PID 1860 wrote to memory of 4452 1860 2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe 86 PID 1860 wrote to memory of 2884 1860 2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe 87 PID 1860 wrote to memory of 2884 1860 2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe 87 PID 1860 wrote to memory of 2884 1860 2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe 87 PID 4332 wrote to memory of 5068 4332 SearchIndexer.exe 89 PID 4332 wrote to memory of 5068 4332 SearchIndexer.exe 89 PID 4332 wrote to memory of 3960 4332 SearchIndexer.exe 90 PID 4332 wrote to memory of 3960 4332 SearchIndexer.exe 90 PID 4452 wrote to memory of 2392 4452 quymtwmnbe.exe 91 PID 4452 wrote to memory of 2392 4452 quymtwmnbe.exe 91 PID 4452 wrote to memory of 2392 4452 quymtwmnbe.exe 91 PID 2884 wrote to memory of 2548 2884 dddnutzwcp.exe 95 PID 2884 wrote to memory of 2548 2884 dddnutzwcp.exe 95 PID 2548 wrote to memory of 1808 2548 cmd.exe 97 PID 2548 wrote to memory of 1808 2548 cmd.exe 97 PID 2884 wrote to memory of 4816 2884 dddnutzwcp.exe 98 PID 2884 wrote to memory of 4816 2884 dddnutzwcp.exe 98 PID 2884 wrote to memory of 3852 2884 dddnutzwcp.exe 100 PID 2884 wrote to memory of 3852 2884 dddnutzwcp.exe 100 PID 2884 wrote to memory of 3852 2884 dddnutzwcp.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe"C:\Users\Admin\AppData\Local\Temp\2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\quymtwmnbe.exe"C:\Users\Admin\AppData\Local\Temp\quymtwmnbe.exe" "C:\Users\Admin\AppData\Local\Temp\wondswvbja.exe" "C:\Users\Admin\AppData\Local\Temp\2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe"C:\Users\Admin\AppData\Local\Temp\2706e6516e6f2096e97947c061554a30c15df25b323f8d8ef26a83498d16d475.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2392
-
-
-
C:\Users\Admin\AppData\Local\Temp\dddnutzwcp.exeC:\Users\Admin\AppData\Local\Temp\dddnutzwcp.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\System32\cmd.exe/c sc config msdtc obj= LocalSystem3⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\sc.exesc config msdtc obj= LocalSystem4⤵
- Launches sc.exe
PID:1808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\TXBOlLz7.bat"3⤵PID:4816
-
-
C:\Windows\System32\bindsvc.exe"C:\Windows\System32\bindsvc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3852
-
-
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:5068
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 7842⤵
- Modifies data under HKEY_USERS
PID:3960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196B
MD54298493ebabee3c8a66b36b7a2902504
SHA1cf3672d95aa1557e9a2ac608b5bb5ec1c79d8661
SHA256198ff0deb0fefdd627e1e0bb0691a2aa216f7f7b46a52fdd8939efdc34860ad9
SHA512998d87f7e24967bbbc49f66e23e98d8956fa229bea74bcfc11c9022cf929e92eb988abfe410cc1b514f0ae716fa134aada4c9501b9eaa58fe3a51c7a16b2c7f6
-
Filesize
580KB
MD52c2029588ad8b86759c17b7ae885ee03
SHA191653b5344d4c210201218e2f215dd5228d76799
SHA2563ab288c47914e33cc61985e46502158400faa9d7187b55c19039b8795504a290
SHA51288531fe6b0f2d66ada368a431f912868f74f9ed8ade9dc88887807b761490fe2cc317e1b6b40e7070411924c80971f237dca68ad2faafa7b4b1ecd2ec90c860f
-
Filesize
51KB
MD5e48b89715bf5e4c55eb5a1fed67865d9
SHA189a287da39e14b02cdc284eb287549462346d724
SHA256c25d90168fc2026d8ed2a69c066bd5a7e11004c3899928a7db24cb7636fc4d9e
SHA5124bd77d2fa5da646009ebeeedb5610048c58598ee7e5aeb5660b0c01042f0f34a88f89181e13e86c06cae9984155d0299128a2aee1c2c16f18e284db4745d850c
-
Filesize
65KB
MD5f13ec8a783e0cb0d6dc26a3ca848b7b8
SHA16107fb5303a7a886f6f2674fb73c543696779dac
SHA2560809e3b71709f1343086eeb6c820543c1a7119e74eef8ac1aee1f81093abec66
SHA512d6d060ff085e3d51b90c913a016ffee9c0266ab2a3a8113abd30d1d9e876652078d9980b1d3a37d8f70c2407c4434df4f64b5c6a6f111b910bb7bf7a4e36f579
-
Filesize
1KB
MD5a089fecc62ba2a0f061b36018aa866b8
SHA130a0298b0729f4cd475eb33b4c4dad228ed34a0e
SHA2569830a0d1d8598abd80e58d60402e883e34f28f8b5c9355c22d4739195fecd9f3
SHA5124ce2a9aad660c6a120e5a11eff97ce80f702b0447c391f039d4c4338fabcfc928c89f271a00daa941c6036a9ffe7f41180bb714b48cf79a19c26bf9f436c4ebf
-
Filesize
291KB
MD57c5b397fb54d5aa06bd2a6fb99c62fee
SHA1a9e0bf7bbabf6ab9e294156985537ae972ebd743
SHA256d032bdc64c9451bbb653b346c5bd6ac9f83a91edeb0155497f098c8d6182ddee
SHA512daa4702eff625b5dd1edca358c653338cff4eeca4e43d12dfd39bbc52acf8dfde3b963d190cf4426e405d9db8bcc9817cd50868055aa0d4a9efe4d1042beaf0c