Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe
Resource
win10v2004-20250314-en
General
-
Target
2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe
-
Size
3.8MB
-
MD5
220aae5d05fd2cc172ddb78e3b5a79d8
-
SHA1
7f66e1d9d3bb81eb4df045ca7ece093ca166a595
-
SHA256
2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245
-
SHA512
3252348ade86c5913648c041ce58e438b7be7ca8b1554ba64f1024a4d9e126d19bb8a58536f5a4a1d0b2c93d472393f32336fac800c1b8b66a82bd274e0fc2c2
-
SSDEEP
49152:MhbFk85ulG4dJXY5UeD1jWs1O/BP4YPpPAPGPpPVP6PJP8P8P9PdPdPRPfPdPlPl:WRk85ulG4XywJxFTsmBm
Malware Config
Extracted
valleyrat_s2
1.0
154.219.97.191:6666
-
campaign_date
2025. 3.14
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
ValleyRat
ValleyRat stage2 is a backdoor written in C++.
-
Valleyrat_s2 family
-
Blocklisted process makes network request 22 IoCs
flow pid Process 28 4576 cmd.exe 29 396 cmd.exe 30 5400 cmd.exe 32 5400 cmd.exe 34 4576 cmd.exe 40 396 cmd.exe 42 5400 cmd.exe 43 4576 cmd.exe 68 5400 cmd.exe 69 4576 cmd.exe 70 5400 cmd.exe 71 4576 cmd.exe 76 5400 cmd.exe 77 4576 cmd.exe 78 5400 cmd.exe 79 4576 cmd.exe 88 5400 cmd.exe 90 4576 cmd.exe 91 5400 cmd.exe 92 4576 cmd.exe 93 5400 cmd.exe 94 4576 cmd.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation qusdjcxzzsa.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ebIvyJi.lnk 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe -
Executes dropped EXE 5 IoCs
pid Process 2276 qusdjcxzzsa.exe 864 qusdjcxzzsa.exe 1748 asdccx.exe 3992 asdccx.exe 3328 asdccx.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: cmd.exe File opened (read-only) \??\X: cmd.exe File opened (read-only) \??\Z: cmd.exe File opened (read-only) \??\G: cmd.exe File opened (read-only) \??\L: cmd.exe File opened (read-only) \??\Q: cmd.exe File opened (read-only) \??\T: cmd.exe File opened (read-only) \??\W: cmd.exe File opened (read-only) \??\H: cmd.exe File opened (read-only) \??\J: cmd.exe File opened (read-only) \??\S: cmd.exe File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\L: cmd.exe File opened (read-only) \??\M: cmd.exe File opened (read-only) \??\Z: cmd.exe File opened (read-only) \??\V: cmd.exe File opened (read-only) \??\R: cmd.exe File opened (read-only) \??\U: cmd.exe File opened (read-only) \??\Q: cmd.exe File opened (read-only) \??\R: cmd.exe File opened (read-only) \??\G: cmd.exe File opened (read-only) \??\W: cmd.exe File opened (read-only) \??\J: cmd.exe File opened (read-only) \??\B: cmd.exe File opened (read-only) \??\H: cmd.exe File opened (read-only) \??\S: cmd.exe File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\O: cmd.exe File opened (read-only) \??\Y: cmd.exe File opened (read-only) \??\P: cmd.exe File opened (read-only) \??\X: cmd.exe File opened (read-only) \??\J: cmd.exe File opened (read-only) \??\Q: cmd.exe File opened (read-only) \??\R: cmd.exe File opened (read-only) \??\V: cmd.exe File opened (read-only) \??\Y: cmd.exe File opened (read-only) \??\I: cmd.exe File opened (read-only) \??\K: cmd.exe File opened (read-only) \??\I: cmd.exe File opened (read-only) \??\W: cmd.exe File opened (read-only) \??\I: cmd.exe File opened (read-only) \??\S: cmd.exe File opened (read-only) \??\K: cmd.exe File opened (read-only) \??\O: cmd.exe File opened (read-only) \??\Y: cmd.exe File opened (read-only) \??\P: cmd.exe File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\N: cmd.exe File opened (read-only) \??\V: cmd.exe File opened (read-only) \??\N: cmd.exe File opened (read-only) \??\O: cmd.exe File opened (read-only) \??\B: cmd.exe File opened (read-only) \??\X: cmd.exe File opened (read-only) \??\U: cmd.exe File opened (read-only) \??\P: cmd.exe File opened (read-only) \??\L: cmd.exe File opened (read-only) \??\T: cmd.exe File opened (read-only) \??\T: cmd.exe File opened (read-only) \??\U: cmd.exe File opened (read-only) \??\Z: cmd.exe File opened (read-only) \??\M: cmd.exe File opened (read-only) \??\K: cmd.exe File opened (read-only) \??\N: cmd.exe File opened (read-only) \??\M: cmd.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 864 set thread context of 396 864 qusdjcxzzsa.exe 103 PID 864 set thread context of 5400 864 qusdjcxzzsa.exe 104 PID 864 set thread context of 4576 864 qusdjcxzzsa.exe 106 PID 864 set thread context of 1748 864 qusdjcxzzsa.exe 107 PID 864 set thread context of 3992 864 qusdjcxzzsa.exe 108 PID 864 set thread context of 3328 864 qusdjcxzzsa.exe 109 -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 2656 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3608 3104 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qusdjcxzzsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qusdjcxzzsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language subst.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings mshta.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 8 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2640 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 2640 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 2640 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 2640 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 864 qusdjcxzzsa.exe 864 qusdjcxzzsa.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe 5400 cmd.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 3104 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 3104 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 3104 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 2640 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 2640 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 2640 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 2276 qusdjcxzzsa.exe 2276 qusdjcxzzsa.exe 2276 qusdjcxzzsa.exe 864 qusdjcxzzsa.exe 864 qusdjcxzzsa.exe 864 qusdjcxzzsa.exe 5400 cmd.exe 4576 cmd.exe 396 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 2640 3104 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 89 PID 3104 wrote to memory of 2640 3104 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 89 PID 3104 wrote to memory of 2640 3104 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 89 PID 2640 wrote to memory of 2276 2640 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 98 PID 2640 wrote to memory of 2276 2640 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 98 PID 2640 wrote to memory of 2276 2640 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe 98 PID 2276 wrote to memory of 864 2276 qusdjcxzzsa.exe 101 PID 2276 wrote to memory of 864 2276 qusdjcxzzsa.exe 101 PID 2276 wrote to memory of 864 2276 qusdjcxzzsa.exe 101 PID 864 wrote to memory of 1780 864 qusdjcxzzsa.exe 102 PID 864 wrote to memory of 1780 864 qusdjcxzzsa.exe 102 PID 864 wrote to memory of 1780 864 qusdjcxzzsa.exe 102 PID 864 wrote to memory of 396 864 qusdjcxzzsa.exe 103 PID 864 wrote to memory of 396 864 qusdjcxzzsa.exe 103 PID 864 wrote to memory of 396 864 qusdjcxzzsa.exe 103 PID 864 wrote to memory of 396 864 qusdjcxzzsa.exe 103 PID 864 wrote to memory of 396 864 qusdjcxzzsa.exe 103 PID 864 wrote to memory of 396 864 qusdjcxzzsa.exe 103 PID 864 wrote to memory of 396 864 qusdjcxzzsa.exe 103 PID 864 wrote to memory of 396 864 qusdjcxzzsa.exe 103 PID 864 wrote to memory of 396 864 qusdjcxzzsa.exe 103 PID 864 wrote to memory of 396 864 qusdjcxzzsa.exe 103 PID 864 wrote to memory of 5400 864 qusdjcxzzsa.exe 104 PID 864 wrote to memory of 5400 864 qusdjcxzzsa.exe 104 PID 864 wrote to memory of 5400 864 qusdjcxzzsa.exe 104 PID 864 wrote to memory of 5400 864 qusdjcxzzsa.exe 104 PID 864 wrote to memory of 5400 864 qusdjcxzzsa.exe 104 PID 864 wrote to memory of 5400 864 qusdjcxzzsa.exe 104 PID 864 wrote to memory of 5400 864 qusdjcxzzsa.exe 104 PID 864 wrote to memory of 5400 864 qusdjcxzzsa.exe 104 PID 864 wrote to memory of 5400 864 qusdjcxzzsa.exe 104 PID 864 wrote to memory of 5400 864 qusdjcxzzsa.exe 104 PID 864 wrote to memory of 4576 864 qusdjcxzzsa.exe 106 PID 864 wrote to memory of 4576 864 qusdjcxzzsa.exe 106 PID 864 wrote to memory of 4576 864 qusdjcxzzsa.exe 106 PID 864 wrote to memory of 4576 864 qusdjcxzzsa.exe 106 PID 864 wrote to memory of 4576 864 qusdjcxzzsa.exe 106 PID 864 wrote to memory of 4576 864 qusdjcxzzsa.exe 106 PID 864 wrote to memory of 4576 864 qusdjcxzzsa.exe 106 PID 864 wrote to memory of 4576 864 qusdjcxzzsa.exe 106 PID 864 wrote to memory of 4576 864 qusdjcxzzsa.exe 106 PID 864 wrote to memory of 4576 864 qusdjcxzzsa.exe 106 PID 864 wrote to memory of 1748 864 qusdjcxzzsa.exe 107 PID 864 wrote to memory of 1748 864 qusdjcxzzsa.exe 107 PID 864 wrote to memory of 1748 864 qusdjcxzzsa.exe 107 PID 864 wrote to memory of 1748 864 qusdjcxzzsa.exe 107 PID 864 wrote to memory of 1748 864 qusdjcxzzsa.exe 107 PID 864 wrote to memory of 1748 864 qusdjcxzzsa.exe 107 PID 864 wrote to memory of 1748 864 qusdjcxzzsa.exe 107 PID 864 wrote to memory of 1748 864 qusdjcxzzsa.exe 107 PID 864 wrote to memory of 1748 864 qusdjcxzzsa.exe 107 PID 864 wrote to memory of 3992 864 qusdjcxzzsa.exe 108 PID 864 wrote to memory of 3992 864 qusdjcxzzsa.exe 108 PID 864 wrote to memory of 3992 864 qusdjcxzzsa.exe 108 PID 864 wrote to memory of 3992 864 qusdjcxzzsa.exe 108 PID 864 wrote to memory of 3992 864 qusdjcxzzsa.exe 108 PID 864 wrote to memory of 3992 864 qusdjcxzzsa.exe 108 PID 864 wrote to memory of 3992 864 qusdjcxzzsa.exe 108 PID 864 wrote to memory of 3992 864 qusdjcxzzsa.exe 108 PID 864 wrote to memory of 3992 864 qusdjcxzzsa.exe 108 PID 864 wrote to memory of 3328 864 qusdjcxzzsa.exe 109 PID 864 wrote to memory of 3328 864 qusdjcxzzsa.exe 109 PID 864 wrote to memory of 3328 864 qusdjcxzzsa.exe 109 PID 864 wrote to memory of 3328 864 qusdjcxzzsa.exe 109 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe"C:\Users\Admin\AppData\Local\Temp\2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe"C:\Users\Admin\AppData\Local\Temp\2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245.exe" shouciyunxing2⤵
- UAC bypass
- Drops startup file
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2640 -
C:\Users\Public\TpzoczV\qusdjcxzzsa.exeC:/Users/Public/TpzoczV\qusdjcxzzsa.exe zhuruxitong3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Public\TpzoczV\qusdjcxzzsa.exe"C:\Users\Public\TpzoczV\qusdjcxzzsa.exe" Kdiaoni4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\TpzoczV\62310.cmd5⤵
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Public\TpzoczV\62310.cmd","::","","runas",0)(window.close)6⤵
- Checks computer location settings
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Public\TpzoczV\62310.cmd" ::7⤵
- System Location Discovery: System Language Discovery
PID:4732 -
C:\Windows\SysWOW64\subst.exesubst o: /d8⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f8⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:8
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\DOS Devices" /v O: /f8⤵
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f8⤵
- Modifies Windows Defender DisableAntiSpyware settings
- System Location Discovery: System Language Discovery
PID:3632
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe5⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe5⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5400
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe5⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4576
-
-
C:\Users\Public\TpzoczV\asdccx.exeC:\Users\Public\TpzoczV\asdccx.exe5⤵
- Executes dropped EXE
PID:1748
-
-
C:\Users\Public\TpzoczV\asdccx.exeC:\Users\Public\TpzoczV\asdccx.exe5⤵
- Executes dropped EXE
PID:3992
-
-
C:\Users\Public\TpzoczV\asdccx.exeC:\Users\Public\TpzoczV\asdccx.exe5⤵
- Executes dropped EXE
PID:3328
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 14122⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3104 -ip 31041⤵PID:3192
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
527B
MD534ac662d5343e07bcb06d373e737252f
SHA1d304ebfd043c4eb09f7c193c3562f94590221211
SHA256777690549389083ce6807b077ee3bb5410cc1a6f0ee73e6afa7d424471ceb173
SHA51260e71ead901bd0fb8cc856ba6a09b2e8dda0eca583e40d44fee9ecb632872054d0b7571a315f990915b52b5fc399bce67e0f2b8468210faef3516f399a0ee80e
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2
-
Filesize
108KB
MD5d442c9efaf31a91319116ef17e0022e7
SHA12809f71775ac044c9e50cf24e2ce1ff3bd16e576
SHA2565662b6f42fcf97143d252c0f43b2d345a53866f0fe737115ecc99ccfc4370eeb
SHA5126ad96ab748b31109661357b9dfc0b5c53e6bab6d8c0ca90273d07c438933bf65a5d81b1257774f104c485ac22c50da4832e509f63b107da6055aa31a509f9eae